General
-
Target
e63df87df22bc2302cd69c4235d33540_JaffaCakes118
-
Size
1.5MB
-
Sample
240917-hdk5yszapn
-
MD5
e63df87df22bc2302cd69c4235d33540
-
SHA1
07c0969da07fb6c81e4d87031e59150d9485639d
-
SHA256
9ba0535c61d531c8128acb5431ca8308e9fec809a9098921e6074822ab2302b9
-
SHA512
dcc3e688c99d01113ea73994e01944cac2a4da6ac85821700361db19b8274a73b1e4f0bddf8314061e8e54bd6473646a6bdc06132e3b967fa9833f8f3aa43d57
-
SSDEEP
24576:Mw2O9/TgwrSUhVPHahmorI0hnvUwLS4A9ifw/vk2+4R:x95cwOI0Zh20fwpBR
Static task
static1
Behavioral task
behavioral1
Sample
e63df87df22bc2302cd69c4235d33540_JaffaCakes118.ps1
Resource
win7-20240704-en
Malware Config
Extracted
netwire
turnawayfromyourevilways.duckdns.org:5123
turnawayfromyourevilways.duckdns.org:4123
-
activex_autorun
false
-
copy_executable
false
-
delete_original
true
-
host_id
CONNECTION TEST
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HKBWgTeq
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
e63df87df22bc2302cd69c4235d33540_JaffaCakes118
-
Size
1.5MB
-
MD5
e63df87df22bc2302cd69c4235d33540
-
SHA1
07c0969da07fb6c81e4d87031e59150d9485639d
-
SHA256
9ba0535c61d531c8128acb5431ca8308e9fec809a9098921e6074822ab2302b9
-
SHA512
dcc3e688c99d01113ea73994e01944cac2a4da6ac85821700361db19b8274a73b1e4f0bddf8314061e8e54bd6473646a6bdc06132e3b967fa9833f8f3aa43d57
-
SSDEEP
24576:Mw2O9/TgwrSUhVPHahmorI0hnvUwLS4A9ifw/vk2+4R:x95cwOI0Zh20fwpBR
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-