General
-
Target
84c0dd70e1cb3cf4c4d3ab5b020f85c3_JaffaCakes118
-
Size
132KB
-
Sample
240530-tll8rsdg5z
-
MD5
84c0dd70e1cb3cf4c4d3ab5b020f85c3
-
SHA1
4ab47546df8cfe92b3288c5d8701b0c55a8815e3
-
SHA256
c1047a1415a679ddaba24fbc8a96efdb6c7da23b0c30513b108ab9ca5c4e4b95
-
SHA512
71cc7c1d662663149c8bf0c8d2b6ae3bc10d8097ab39cd78b0c445dc2ee74bf3aebd0e43b4d69c0c128d2acfd398ba8a90431c15f3c1073de27ba6e808e35aa6
-
SSDEEP
1536:dtTSUSKzF0Lh9a7WraTWFbmDHVXWRVAzZ8MfUSl7Q3rwz5ggZG:dt5SKzF0Lh9a7IGW9GHeOFVvc3ruZG
Behavioral task
behavioral1
Sample
84c0dd70e1cb3cf4c4d3ab5b020f85c3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84c0dd70e1cb3cf4c4d3ab5b020f85c3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
127.0.0.1:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
jamesemonkey
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
oYJRIRfr
-
offline_keylogger
true
-
password
AloraSealord2018!
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
84c0dd70e1cb3cf4c4d3ab5b020f85c3_JaffaCakes118
-
Size
132KB
-
MD5
84c0dd70e1cb3cf4c4d3ab5b020f85c3
-
SHA1
4ab47546df8cfe92b3288c5d8701b0c55a8815e3
-
SHA256
c1047a1415a679ddaba24fbc8a96efdb6c7da23b0c30513b108ab9ca5c4e4b95
-
SHA512
71cc7c1d662663149c8bf0c8d2b6ae3bc10d8097ab39cd78b0c445dc2ee74bf3aebd0e43b4d69c0c128d2acfd398ba8a90431c15f3c1073de27ba6e808e35aa6
-
SSDEEP
1536:dtTSUSKzF0Lh9a7WraTWFbmDHVXWRVAzZ8MfUSl7Q3rwz5ggZG:dt5SKzF0Lh9a7IGW9GHeOFVvc3ruZG
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-