General
-
Target
8736d4b3663567fa4350ce83083f0bcb_JaffaCakes118
-
Size
567KB
-
Sample
240531-q32g8sbb68
-
MD5
8736d4b3663567fa4350ce83083f0bcb
-
SHA1
e91f34ea5e741402eb6fb4ca9c16e703928a5af2
-
SHA256
2b4a6ef807924dd10f65081a11ad5193c9334e9c8aea22cf0cfd90a65193d626
-
SHA512
a01a2183d4e9d0113dad8c65908c4d826f2f448fbbece61d1ad6bcd617a49a942bccd7ef63e374d6a93fcd87291ededb4ad8c58c6c10d81bc655acd073b46539
-
SSDEEP
12288:RM/VGR9lbM/VGR9leCOPUv8iMsVfmU8lRVrN:G/VGe/VG6s0iMgf8lRVrN
Static task
static1
Behavioral task
behavioral1
Sample
8736d4b3663567fa4350ce83083f0bcb_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8736d4b3663567fa4350ce83083f0bcb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
cncbtc.zapto.org:3360
btcloldab.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
uGcjuNnv
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
8736d4b3663567fa4350ce83083f0bcb_JaffaCakes118
-
Size
567KB
-
MD5
8736d4b3663567fa4350ce83083f0bcb
-
SHA1
e91f34ea5e741402eb6fb4ca9c16e703928a5af2
-
SHA256
2b4a6ef807924dd10f65081a11ad5193c9334e9c8aea22cf0cfd90a65193d626
-
SHA512
a01a2183d4e9d0113dad8c65908c4d826f2f448fbbece61d1ad6bcd617a49a942bccd7ef63e374d6a93fcd87291ededb4ad8c58c6c10d81bc655acd073b46539
-
SSDEEP
12288:RM/VGR9lbM/VGR9leCOPUv8iMsVfmU8lRVrN:G/VGe/VG6s0iMgf8lRVrN
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-