General
-
Target
f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118
-
Size
385KB
-
Sample
240924-qxwpsszhjh
-
MD5
f3c31b6b521ebc6457c7db4ebb2ff85f
-
SHA1
d22d39dd8abf73e3ccc5b711f711e21ba178ce12
-
SHA256
0e305f4c1bc84575b8a3c2e67e8bfe4a9580435aac0de239a97d535c75a22417
-
SHA512
130b82c48fa2dec153b93c49e7e4c9a58aaba592562210dd65b9e46cc4ea7fd85558e052f0faa1e06ddd1c4a9ec7f6d1a4da02eb93ef71ce87ec43e41d5402d1
-
SSDEEP
6144:JF1JVcCGhDE3S8KssNxqqpSWsq4SupPW32yZ8YW+hJo00:nrVfGNEi8KrNxqOzfKPWfNJ1
Static task
static1
Behavioral task
behavioral1
Sample
f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
netwire
194.68.59.62:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Frank456
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
f3c31b6b521ebc6457c7db4ebb2ff85f_JaffaCakes118
-
Size
385KB
-
MD5
f3c31b6b521ebc6457c7db4ebb2ff85f
-
SHA1
d22d39dd8abf73e3ccc5b711f711e21ba178ce12
-
SHA256
0e305f4c1bc84575b8a3c2e67e8bfe4a9580435aac0de239a97d535c75a22417
-
SHA512
130b82c48fa2dec153b93c49e7e4c9a58aaba592562210dd65b9e46cc4ea7fd85558e052f0faa1e06ddd1c4a9ec7f6d1a4da02eb93ef71ce87ec43e41d5402d1
-
SSDEEP
6144:JF1JVcCGhDE3S8KssNxqqpSWsq4SupPW32yZ8YW+hJo00:nrVfGNEi8KrNxqOzfKPWfNJ1
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-