General
-
Target
9dc8a50b5c0ed06c738db3a59786c1fc_JaffaCakes118
-
Size
972KB
-
Sample
240611-ly9ktstbnq
-
MD5
9dc8a50b5c0ed06c738db3a59786c1fc
-
SHA1
d4d3e2e84b292dd1311d11d8b10abe308cc73351
-
SHA256
9635cc980226b05a5b434cf95bbcecfe51c3623f38b30dd98743ddc87665aaa8
-
SHA512
a0bb1818487911e92fdf02fd3a6080b7a86eb28382f77043e35863da37360874609e2b5bd8071b0897f49925c085cbc1638925f5cc943d9fb431cfb273d6fd06
-
SSDEEP
6144:lom9cSAPASKDHOIrPHl9O2/pmddZahEh5Eo4Fwin6lBbK6NPw450oeVgv:um9cXPASWFLOGIddZa
Static task
static1
Behavioral task
behavioral1
Sample
9dc8a50b5c0ed06c738db3a59786c1fc_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
lokibot
http://dresson1.com/wip-admin/js/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
netwire
iheuche009.hopto.org:1199
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Bushbush
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
YvdhOUPp
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
9dc8a50b5c0ed06c738db3a59786c1fc_JaffaCakes118
-
Size
972KB
-
MD5
9dc8a50b5c0ed06c738db3a59786c1fc
-
SHA1
d4d3e2e84b292dd1311d11d8b10abe308cc73351
-
SHA256
9635cc980226b05a5b434cf95bbcecfe51c3623f38b30dd98743ddc87665aaa8
-
SHA512
a0bb1818487911e92fdf02fd3a6080b7a86eb28382f77043e35863da37360874609e2b5bd8071b0897f49925c085cbc1638925f5cc943d9fb431cfb273d6fd06
-
SSDEEP
6144:lom9cSAPASKDHOIrPHl9O2/pmddZahEh5Eo4Fwin6lBbK6NPw450oeVgv:um9cXPASWFLOGIddZa
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-