General
-
Target
d272c58f65d0ab7ca56f5801c4276b2e_JaffaCakes118
-
Size
1.1MB
-
Sample
240907-vvcalaxcmh
-
MD5
d272c58f65d0ab7ca56f5801c4276b2e
-
SHA1
142eaf32a020d578054d2e9069209b5c09974ba4
-
SHA256
6b425f6cb96411de7b0738f6564b8607dcf2f58212b1ea15189af8476d2799af
-
SHA512
191fec85e89b0557b59233110b17782ff16f22477c797999797763d8a43b6c0c74c14d69b4cd8097d8200edaba1090caa0ad5b917eb5ff7def37efeaea629b86
-
SSDEEP
24576:OAHnh+eWsN3skA4RV1Hom2KXMmHaTw5sJ/nY5:5h+ZkldoPK8YaTq
Static task
static1
Behavioral task
behavioral1
Sample
d272c58f65d0ab7ca56f5801c4276b2e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
masterhugo231.servecounterstrike.com:3098
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Goodluck101
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
d272c58f65d0ab7ca56f5801c4276b2e_JaffaCakes118
-
Size
1.1MB
-
MD5
d272c58f65d0ab7ca56f5801c4276b2e
-
SHA1
142eaf32a020d578054d2e9069209b5c09974ba4
-
SHA256
6b425f6cb96411de7b0738f6564b8607dcf2f58212b1ea15189af8476d2799af
-
SHA512
191fec85e89b0557b59233110b17782ff16f22477c797999797763d8a43b6c0c74c14d69b4cd8097d8200edaba1090caa0ad5b917eb5ff7def37efeaea629b86
-
SSDEEP
24576:OAHnh+eWsN3skA4RV1Hom2KXMmHaTw5sJ/nY5:5h+ZkldoPK8YaTq
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-