General
-
Target
b0756a14058ba24ffa31d03c5a15c2ee_JaffaCakes118
-
Size
268KB
-
Sample
240615-2jy4jsxdpc
-
MD5
b0756a14058ba24ffa31d03c5a15c2ee
-
SHA1
fa92daf4a6963160e131e543c8c2a51dd8efd84e
-
SHA256
b14ea2f152e1a5710ae3c34f8d98bf85e8d07bfe48a2e03b4987272b0d783855
-
SHA512
5591f61543b8751e3d5ffab83b6fcf7c61dc601a0c80332d05b30460aecbc7a22693d34f30e51ac8e6b67bd74cb7f0ac9459304a4bccd4e572be833374b1e415
-
SSDEEP
6144:XyBLkXVtU8FTskYpYr+ufYQxiaBXozlQuUCrST:XyBLkXHUwwfpJmYQcaBgvUNT
Static task
static1
Behavioral task
behavioral1
Sample
b0756a14058ba24ffa31d03c5a15c2ee_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
fingers1.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
b0756a14058ba24ffa31d03c5a15c2ee_JaffaCakes118
-
Size
268KB
-
MD5
b0756a14058ba24ffa31d03c5a15c2ee
-
SHA1
fa92daf4a6963160e131e543c8c2a51dd8efd84e
-
SHA256
b14ea2f152e1a5710ae3c34f8d98bf85e8d07bfe48a2e03b4987272b0d783855
-
SHA512
5591f61543b8751e3d5ffab83b6fcf7c61dc601a0c80332d05b30460aecbc7a22693d34f30e51ac8e6b67bd74cb7f0ac9459304a4bccd4e572be833374b1e415
-
SSDEEP
6144:XyBLkXVtU8FTskYpYr+ufYQxiaBXozlQuUCrST:XyBLkXHUwwfpJmYQcaBgvUNT
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-