General
-
Target
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118
-
Size
427KB
-
Sample
240831-1wkagsxgjm
-
MD5
cdacadda6a7ecfb449310a3f92bbd6de
-
SHA1
ae7520c09469cce70d9495d9092c49f176dac67c
-
SHA256
709461e5e465b5b776ceb72a7fa69772cb97460ad5daf8dbe756e0614678d2e3
-
SHA512
9314a3e2b69f9bdd6f208e9d3e3647baa640d26e20ffa60db7ce1e027b0af4380a7b8a63b8b477119f5fb2596e218843bcf6387d75dd31eab64b637d3515711e
-
SSDEEP
6144:ojbei8D7JNEeHfZEW6GH5W288Lhvb5HEGa+00bivT0HdibcIAKZ0:ou7tzgGH5W28UvbeGrZOhcc0
Static task
static1
Behavioral task
behavioral1
Sample
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Extracted
netwire
qualitytrade12.hopto.org:3194
-
activex_autorun
true
-
activex_key
{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V}
-
copy_executable
true
-
delete_original
false
-
host_id
NEWCLIENT
-
install_path
%AppData%\Install\word.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
IAqepjWi
-
offline_keylogger
true
-
password
master45
-
registry_autorun
true
-
startup_name
Mozila
-
use_mutex
true
Targets
-
-
Target
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118
-
Size
427KB
-
MD5
cdacadda6a7ecfb449310a3f92bbd6de
-
SHA1
ae7520c09469cce70d9495d9092c49f176dac67c
-
SHA256
709461e5e465b5b776ceb72a7fa69772cb97460ad5daf8dbe756e0614678d2e3
-
SHA512
9314a3e2b69f9bdd6f208e9d3e3647baa640d26e20ffa60db7ce1e027b0af4380a7b8a63b8b477119f5fb2596e218843bcf6387d75dd31eab64b637d3515711e
-
SSDEEP
6144:ojbei8D7JNEeHfZEW6GH5W288Lhvb5HEGa+00bivT0HdibcIAKZ0:ou7tzgGH5W28UvbeGrZOhcc0
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-