General
-
Target
38e8638895f1f48d42ed8a4057f25f59_JaffaCakes118
-
Size
825KB
-
Sample
240711-ngq39sthkj
-
MD5
38e8638895f1f48d42ed8a4057f25f59
-
SHA1
206ba13d209e32370426efa9c5d21580192277b6
-
SHA256
4172a2a02922b30e271894eee4ee13f4d2d793865329d44f29098862d2053803
-
SHA512
312dd1d7177c2ae3f44b95aed9f85eedfd5038352c8e4cdc8cebbb141ea696e6b6517d2e4ef2afaf94a05b4250e70f17e0402604922bdf619ddd8da378efb9ac
-
SSDEEP
24576:f2O/Glt//8PZE5N/KiPAdK9trWMVwmxhKbH3rUO46GI:HESAtXCMVwmxUT3iQ
Static task
static1
Behavioral task
behavioral1
Sample
38e8638895f1f48d42ed8a4057f25f59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38e8638895f1f48d42ed8a4057f25f59_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
netwire
185.244.29.116:4066
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Nov12345
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
38e8638895f1f48d42ed8a4057f25f59_JaffaCakes118
-
Size
825KB
-
MD5
38e8638895f1f48d42ed8a4057f25f59
-
SHA1
206ba13d209e32370426efa9c5d21580192277b6
-
SHA256
4172a2a02922b30e271894eee4ee13f4d2d793865329d44f29098862d2053803
-
SHA512
312dd1d7177c2ae3f44b95aed9f85eedfd5038352c8e4cdc8cebbb141ea696e6b6517d2e4ef2afaf94a05b4250e70f17e0402604922bdf619ddd8da378efb9ac
-
SSDEEP
24576:f2O/Glt//8PZE5N/KiPAdK9trWMVwmxhKbH3rUO46GI:HESAtXCMVwmxUT3iQ
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-