General
-
Target
bafa0f69c4195ffc32165b55a08e23e0_JaffaCakes118
-
Size
1.1MB
-
Sample
240618-k8s56a1dpr
-
MD5
bafa0f69c4195ffc32165b55a08e23e0
-
SHA1
d4ece78b80381b5baa855b7404b383e4d1731831
-
SHA256
c8de09489bb5817e2860f460863a3617399d60239c95f23754f2bc82031f07d8
-
SHA512
365d0d4ee68b3af2d8ce821371ac465427e012409c6c7657a3d07fa12fc2f295f9643ff75ca8b1aa4950d46e9a3428cd4e16851f1b396095b31745db3f58afe0
-
SSDEEP
24576:eCdxte/80jYLT3U1jfsWaw+l6e4z85C9UlQ:3w80cTsjkWawVeDO
Static task
static1
Behavioral task
behavioral1
Sample
bafa0f69c4195ffc32165b55a08e23e0_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
bafa0f69c4195ffc32165b55a08e23e0_JaffaCakes118
-
Size
1.1MB
-
MD5
bafa0f69c4195ffc32165b55a08e23e0
-
SHA1
d4ece78b80381b5baa855b7404b383e4d1731831
-
SHA256
c8de09489bb5817e2860f460863a3617399d60239c95f23754f2bc82031f07d8
-
SHA512
365d0d4ee68b3af2d8ce821371ac465427e012409c6c7657a3d07fa12fc2f295f9643ff75ca8b1aa4950d46e9a3428cd4e16851f1b396095b31745db3f58afe0
-
SSDEEP
24576:eCdxte/80jYLT3U1jfsWaw+l6e4z85C9UlQ:3w80cTsjkWawVeDO
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-