General
-
Target
601eac781876bbe44d59f1cd2e6f38b0_JaffaCakes118
-
Size
824KB
-
Sample
240720-mjbkxsxhml
-
MD5
601eac781876bbe44d59f1cd2e6f38b0
-
SHA1
d4467be6a1db3962cf9287d27245ec7ae03641f3
-
SHA256
5f5e8fca6ab9657c82efdc33fe9084c8bf1c3f71dff22879700d7b0a3ec87995
-
SHA512
3b46e954a871852f9f124bebffeef9d46616e7f463fd54675fbf256f11853c056acb7fa1f291667bd528d899aeb0c271fa2a8397dd5ab66a20a620cda0804232
-
SSDEEP
24576:f2O/GlKzBmrxcuUoXJ4yzwmxhKbH3rUO46GnZp0:c+yCSwmxUT3ivZp0
Static task
static1
Behavioral task
behavioral1
Sample
601eac781876bbe44d59f1cd2e6f38b0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
601eac781876bbe44d59f1cd2e6f38b0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
netwire
185.244.29.116:4066
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Nov12345
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
601eac781876bbe44d59f1cd2e6f38b0_JaffaCakes118
-
Size
824KB
-
MD5
601eac781876bbe44d59f1cd2e6f38b0
-
SHA1
d4467be6a1db3962cf9287d27245ec7ae03641f3
-
SHA256
5f5e8fca6ab9657c82efdc33fe9084c8bf1c3f71dff22879700d7b0a3ec87995
-
SHA512
3b46e954a871852f9f124bebffeef9d46616e7f463fd54675fbf256f11853c056acb7fa1f291667bd528d899aeb0c271fa2a8397dd5ab66a20a620cda0804232
-
SSDEEP
24576:f2O/GlKzBmrxcuUoXJ4yzwmxhKbH3rUO46GnZp0:c+yCSwmxUT3ivZp0
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-