General
-
Target
cb8f3646b1f9120e39b0df7736813817_JaffaCakes118
-
Size
334KB
-
Sample
240830-ypeqbasdqc
-
MD5
cb8f3646b1f9120e39b0df7736813817
-
SHA1
820903daca2aba6c68d188e39036e75188f9aaf6
-
SHA256
cb278352cefad39d6e0d5ddcbd7b113b1abf6d27fb525d4ab3a79606bef98914
-
SHA512
868996c0ef7b7fc58cc6502cbf018e6b44f5f2c7d3d2bb8fcbdca21d1cf63b4f58cfc4269c0c6abeec706e6f2e9b4a660c2df63b5f4116dbd639bfe2dc421e50
-
SSDEEP
6144:KVfPNS/+PNS/fWeymcbBsri3iLNiA1tq4ZKMwuyMS9a:AfPPPWyFgAid1Yowbv
Static task
static1
Behavioral task
behavioral1
Sample
cb8f3646b1f9120e39b0df7736813817_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
netwire
194.68.59.48:3369
194.68.59.48:3367
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Frank101
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
cb8f3646b1f9120e39b0df7736813817_JaffaCakes118
-
Size
334KB
-
MD5
cb8f3646b1f9120e39b0df7736813817
-
SHA1
820903daca2aba6c68d188e39036e75188f9aaf6
-
SHA256
cb278352cefad39d6e0d5ddcbd7b113b1abf6d27fb525d4ab3a79606bef98914
-
SHA512
868996c0ef7b7fc58cc6502cbf018e6b44f5f2c7d3d2bb8fcbdca21d1cf63b4f58cfc4269c0c6abeec706e6f2e9b4a660c2df63b5f4116dbd639bfe2dc421e50
-
SSDEEP
6144:KVfPNS/+PNS/fWeymcbBsri3iLNiA1tq4ZKMwuyMS9a:AfPPPWyFgAid1Yowbv
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-