General
-
Target
33dc22b4ef25fe6fee8a43e641c608f5_JaffaCakes118
-
Size
1003KB
-
Sample
241011-h66x5a1grc
-
MD5
33dc22b4ef25fe6fee8a43e641c608f5
-
SHA1
e148843d5cee93f9b50c15425c6b1b01af00973b
-
SHA256
ba8ed49fd6348e63a8b6de28ffdf70f4267613b6e32a481d7528ff3f33016c7f
-
SHA512
e1bcc25c4091b341926cc74bb764f7a9d6ba356cdd50d512e671b11c9c65354d6a070c7dea779f6bac6882cb4883855f08f4952b94ec9af1e7292344244d21ea
-
SSDEEP
12288:7K2mhAMJ/cPlM/GuJhqPTFQNSSK81YBXcQOCLsn2lwnlZwL0ZApuA3bDtWSY:O2O/GlMVJ4PT2IEeOCLs2lQlZP69bY
Static task
static1
Behavioral task
behavioral1
Sample
33dc22b4ef25fe6fee8a43e641c608f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33dc22b4ef25fe6fee8a43e641c608f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
netwire
194.68.59.66:3365
194.68.59.66:3367
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Fuckyou1
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
33dc22b4ef25fe6fee8a43e641c608f5_JaffaCakes118
-
Size
1003KB
-
MD5
33dc22b4ef25fe6fee8a43e641c608f5
-
SHA1
e148843d5cee93f9b50c15425c6b1b01af00973b
-
SHA256
ba8ed49fd6348e63a8b6de28ffdf70f4267613b6e32a481d7528ff3f33016c7f
-
SHA512
e1bcc25c4091b341926cc74bb764f7a9d6ba356cdd50d512e671b11c9c65354d6a070c7dea779f6bac6882cb4883855f08f4952b94ec9af1e7292344244d21ea
-
SSDEEP
12288:7K2mhAMJ/cPlM/GuJhqPTFQNSSK81YBXcQOCLsn2lwnlZwL0ZApuA3bDtWSY:O2O/GlMVJ4PT2IEeOCLs2lQlZP69bY
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-