General
-
Target
e834f3579bb9aa88dd9bad15e964bf89_JaffaCakes118
-
Size
891KB
-
Sample
240918-dk835szarg
-
MD5
e834f3579bb9aa88dd9bad15e964bf89
-
SHA1
9c8254d6e45e0b9dc4d0b672ef9aabb5ee53c925
-
SHA256
c424f3d9cd1b47e23678c1d0d02cf9b4befbacf8ba63491019b28d5abcbaf0ee
-
SHA512
dab6646bdfc266638fa62318b9b765a8f2de93509f0b900e463d1bd4f104776b821200e343c155cb74d3ba846ee1eb015f803134811da00f7905697b81fc5ee9
-
SSDEEP
24576:eH9vvaLdMTNHJcYXPHGDzsdEodx7o39FQYcgHE8:K9vvIMlXEmxU96s
Static task
static1
Behavioral task
behavioral1
Sample
Proof of payment.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
185.140.53.220:3363
185.140.53.220:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
NETHERLAND
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Proof of payment.exe
-
Size
1006KB
-
MD5
7e1d18de24aeff3df526dc7ab6ff05dc
-
SHA1
49f9323be153edc7d4467aa3280f9afc3d6b1533
-
SHA256
629333f4adba87b2412a8c8fa301a25042de764506ea1f369b38fa10c6112547
-
SHA512
999e7c19a26fe755132bba012884410d9a181beaa476aade615f3961e2ca911de988d35d04a196ee76748469ac1a0b1c0330d0a7728d574318872766c364449e
-
SSDEEP
24576:6NA3R5drXdtBeHJePXzHbuzBux7s3oFQYcEn7W:z5bEaxIo6V
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-