General
-
Target
a719d5acd1abae97b32bf46e28be51a7_JaffaCakes118
-
Size
202KB
-
Sample
240818-sck4nsyfpg
-
MD5
a719d5acd1abae97b32bf46e28be51a7
-
SHA1
9456cf33b2ddef6d11e34f16777abc67080aa0ff
-
SHA256
8c64fcdec4d4a4771281f2836b712abfd640bbe10a06dcbed5da7fa5c253d297
-
SHA512
0b925b8cf5475cd3f03f99bedaba4d76c7081b6ab2f390fe363b59bce8eb0b10472deb0ec5cb2abec7929d3dfa838cf6293f2f723485a5389579ddf224201511
-
SSDEEP
6144:K9aLi29UCfQ3Qz/HohGRqz41mTn8u3ujcF:ni27fQgzQhvzVb87Y
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20240708-en
Malware Config
Extracted
netwire
79.134.225.94:7119
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
New order
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
New order.exe
-
Size
615KB
-
MD5
9df25a599697716759c0183e3284f8aa
-
SHA1
405af3516b660318f006c16b2829adf0ec8e7d14
-
SHA256
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
-
SHA512
e13a74ee635eea2c77ed1e4b7b8074de3f87e530a20ee1ec3763933e915621adcdf3c057d6b5e19e80d1ffed776482a47b08e4b996d2f6f0c981fac86e109f27
-
SSDEEP
6144:NqWjPKnTiEObu5HRp7l9BdE7ZPZlI8xSE:NqWjPKTJ5DzEVM8AE
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-