General
-
Target
e47938995903c2792020e366716b4c38_JaffaCakes118
-
Size
167KB
-
Sample
240916-le6ptszfrn
-
MD5
e47938995903c2792020e366716b4c38
-
SHA1
5418d60c95e010dc50cee453eaef400f9cc1dfbd
-
SHA256
09a4637db3d0b1cbf3114013c150d89ba01a827f534be57bcc4aaf8d9a18eba6
-
SHA512
0f8631e2ab6f097c37dd86047ab816a798c7ff2cb5d7632ab07aef81021e745fee882554e57824d8b46d05dfbaf31c293aeeb49887c55c0b9cca2f281aea7769
-
SSDEEP
3072:OAhnswMzWqBSRGjY9akwgf6A9wZz/MPDox6ia9kJBx8eMCONeNY6hzcXy:9yS6kwgfHwZ7MxlkLJONefCXy
Static task
static1
Behavioral task
behavioral1
Sample
e47938995903c2792020e366716b4c38_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
extensions14718.sytes.net:3324
extensions14718sec.sytes.net:3324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
YbcwLUQv
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
e47938995903c2792020e366716b4c38_JaffaCakes118
-
Size
167KB
-
MD5
e47938995903c2792020e366716b4c38
-
SHA1
5418d60c95e010dc50cee453eaef400f9cc1dfbd
-
SHA256
09a4637db3d0b1cbf3114013c150d89ba01a827f534be57bcc4aaf8d9a18eba6
-
SHA512
0f8631e2ab6f097c37dd86047ab816a798c7ff2cb5d7632ab07aef81021e745fee882554e57824d8b46d05dfbaf31c293aeeb49887c55c0b9cca2f281aea7769
-
SSDEEP
3072:OAhnswMzWqBSRGjY9akwgf6A9wZz/MPDox6ia9kJBx8eMCONeNY6hzcXy:9yS6kwgfHwZ7MxlkLJONefCXy
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-