General
-
Target
a425430c98ab5080f1f5e5eb24adc809_JaffaCakes118
-
Size
430KB
-
Sample
240817-zy55asxamh
-
MD5
a425430c98ab5080f1f5e5eb24adc809
-
SHA1
7e2aa0bde6d621aa7242e81a98ab4a32c48fa90b
-
SHA256
51ffc7a0d345b5b01709f51fb8e6c3dd178fb89adccd7a3aad8cb0d6584f320d
-
SHA512
22cade5dd1b22cb9fd9b09aa3f8dbcb92873a7fccfc0be509e422d7c73c3d4e73878af1735db90100e475c12b707f3f4a1a32386a644594679c576afcc7105cb
-
SSDEEP
12288:3qyiJgwUCVVc8bUaRNjaddCpZiiyG+GJ0n0x/wkXq:LwUCVVTbUabioZBfUm4P
Static task
static1
Behavioral task
behavioral1
Sample
Eurobelt RFQ 203345_20200626100122637_PDF.exe
Resource
win7-20240704-en
Malware Config
Extracted
netwire
sydor.tjsosda.com:5563
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
FRESH
-
install_path
%AppData%\Install\msc0nfig.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Qx7cUxUUgS
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Eurobelt RFQ 203345_20200626100122637_PDF.exe
-
Size
566KB
-
MD5
e84685ec0b33fb56abead1aaf166b8ad
-
SHA1
ea3d03757c1d1c053abe433a28fedc48eb28a6a1
-
SHA256
e6db6d5f9019bdefffc749264a267c1927dcf5eba5a7ea3dfb10db457b6b2a16
-
SHA512
49285b13846735cc76d7cd9c2af1e33156c7bcb90ada17e95dadb1b28c86086287813c90bc20640876035de180487622a40b85b96196faefb28bd256eebf578a
-
SSDEEP
12288:9crNS33L10QdrXP/X+tGfnF2gqm1BRNWXlLslygCoPk6iS:ANA3R5drXPrfF11nNW1LslygH
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-