General
-
Target
47ed26d0a0f4d8a98d743f23a6e36c22_JaffaCakes118
-
Size
1.0MB
-
Sample
241015-p5lzwszbml
-
MD5
47ed26d0a0f4d8a98d743f23a6e36c22
-
SHA1
bfa384cb2680435f734eb1913611ebe19231a609
-
SHA256
40cbbf504a6af3b5ad0d25cb02f4dc9544596d6978468b708c9f2248953a4e6c
-
SHA512
2c54ccef260bf5dc24a81bfb0de7bc38f1f0308fc62f275ff839713d03e860619a3b491a6d2463b33d341d6a448df0bb3a62738c487c678d4557be496473f401
-
SSDEEP
24576:VAHnh+eWsN3skA4RV1Hom2KXFmIaYx0tZVO55:Eh+ZkldoPK1XaYxcZVc
Static task
static1
Behavioral task
behavioral1
Sample
47ed26d0a0f4d8a98d743f23a6e36c22_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
95.167.151.235:8973
-
activex_autorun
true
-
activex_key
{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Targets
-
-
Target
47ed26d0a0f4d8a98d743f23a6e36c22_JaffaCakes118
-
Size
1.0MB
-
MD5
47ed26d0a0f4d8a98d743f23a6e36c22
-
SHA1
bfa384cb2680435f734eb1913611ebe19231a609
-
SHA256
40cbbf504a6af3b5ad0d25cb02f4dc9544596d6978468b708c9f2248953a4e6c
-
SHA512
2c54ccef260bf5dc24a81bfb0de7bc38f1f0308fc62f275ff839713d03e860619a3b491a6d2463b33d341d6a448df0bb3a62738c487c678d4557be496473f401
-
SSDEEP
24576:VAHnh+eWsN3skA4RV1Hom2KXFmIaYx0tZVO55:Eh+ZkldoPK1XaYxcZVc
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-