General
-
Target
bf4913db1ad39960c2d34de82376ced1_JaffaCakes118
-
Size
594KB
-
Sample
240824-yhg7vswcpc
-
MD5
bf4913db1ad39960c2d34de82376ced1
-
SHA1
e0cf8a8c913421172f7b5675323cc85557d3d102
-
SHA256
fded53333cec659b61638d4b642ab3a150620b62bd1843ba142a419c168f452d
-
SHA512
6670050cb893abf80dacce1daf88f0571e031789390d1fdbfca51f4fa95690c7df8d8e2531cdc6288522fd43b6f0e89be66dc5ea51a5de527921b7254bbe2464
-
SSDEEP
12288:hoAECX/p6U/Kdo7h+DZW8nh4GlPYQJS0omrN59XM7OHgv6nfcWp:ECX/p6US678lTnh4Ag70owNPYOHgv6nf
Static task
static1
Behavioral task
behavioral1
Sample
bf4913db1ad39960c2d34de82376ced1_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
netwire
213.183.58.12:1555
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
suchfamily
-
install_path
%Temp%\SKYPE.exe
-
keylogger_dir
%Temp%\Logs\
-
lock_executable
false
-
mutex
CBNlDpBK
-
offline_keylogger
true
-
password
Hkoco,~E$)
-
registry_autorun
true
-
startup_name
SKYPE
-
use_mutex
true
Targets
-
-
Target
bf4913db1ad39960c2d34de82376ced1_JaffaCakes118
-
Size
594KB
-
MD5
bf4913db1ad39960c2d34de82376ced1
-
SHA1
e0cf8a8c913421172f7b5675323cc85557d3d102
-
SHA256
fded53333cec659b61638d4b642ab3a150620b62bd1843ba142a419c168f452d
-
SHA512
6670050cb893abf80dacce1daf88f0571e031789390d1fdbfca51f4fa95690c7df8d8e2531cdc6288522fd43b6f0e89be66dc5ea51a5de527921b7254bbe2464
-
SSDEEP
12288:hoAECX/p6U/Kdo7h+DZW8nh4GlPYQJS0omrN59XM7OHgv6nfcWp:ECX/p6US678lTnh4Ag70owNPYOHgv6nf
-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-