General
-
Target
e5868d20318b2068ff916241d36d8f2b_JaffaCakes118
-
Size
493KB
-
Sample
240916-zb1lasybmd
-
MD5
e5868d20318b2068ff916241d36d8f2b
-
SHA1
e5a79616e85351555e13adc3d104844bb0f94106
-
SHA256
d7d2907883adb90ded1abc61d1e7837fb422b8a1f316e69ab43ae322126898e2
-
SHA512
4dc61bec51385d539749ec9b3e40751003775cf41a9453dac96702b230de84e245da56bb715401b64ef73da1bd1c02a1ca5249c9f067437444e2e16575efa103
-
SSDEEP
3072:+PL7/B2pA70HqL9IUoWmdI/vRCnB7T38pCDw7o876fy0s5yth3024xMjgv:+PLYpvg9IN2CB7TMpCDwUOv0s5Ok
Static task
static1
Behavioral task
behavioral1
Sample
e5868d20318b2068ff916241d36d8f2b_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
62.102.148.181:57980
213.152.162.99:3829
109.163.226.153:3829
95.211.229.148:3939
31.171.155.48:3444
176.107.177.110:3444
-
activex_autorun
true
-
activex_key
{H7PS4463-146B-40WE-68J6-5074Y040VWP6}
-
copy_executable
true
-
delete_original
true
-
host_id
~June2016~%Rand%
-
install_path
%AppData%\Microsoft\RegistryKey.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
dAfEhCrj
-
offline_keylogger
true
-
password
44eab7d73777
-
registry_autorun
true
-
startup_name
Microsoft
-
use_mutex
true
Targets
-
-
Target
e5868d20318b2068ff916241d36d8f2b_JaffaCakes118
-
Size
493KB
-
MD5
e5868d20318b2068ff916241d36d8f2b
-
SHA1
e5a79616e85351555e13adc3d104844bb0f94106
-
SHA256
d7d2907883adb90ded1abc61d1e7837fb422b8a1f316e69ab43ae322126898e2
-
SHA512
4dc61bec51385d539749ec9b3e40751003775cf41a9453dac96702b230de84e245da56bb715401b64ef73da1bd1c02a1ca5249c9f067437444e2e16575efa103
-
SSDEEP
3072:+PL7/B2pA70HqL9IUoWmdI/vRCnB7T38pCDw7o876fy0s5yth3024xMjgv:+PLYpvg9IN2CB7TMpCDwUOv0s5Ok
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-