General
-
Target
7ab93eaeefca77b3f62423fd50fdd8b0_JaffaCakes118
-
Size
184KB
-
Sample
241028-y85e3svkbw
-
MD5
7ab93eaeefca77b3f62423fd50fdd8b0
-
SHA1
f1728c4881f0d785091d2750a4d9fac262d1fb1b
-
SHA256
1f1d004892a65a3261de01619f65c00601cac8c71be12c78c28f56b482f4ca7f
-
SHA512
6bdad3406116b0749e16cdc24df00ea4a6220f5590ffbc809d984070a9fa302c9af317f2f2011b978bce747bfb200f0969d9d95e5f1e0d6f2a59d49f71906fcb
-
SSDEEP
3072:SgfEqooIOGtISZ8V7WY3FHE5Oag+/GRuUtqFKFXejO:G5OG2Ss71FaO+G00qFWuS
Static task
static1
Behavioral task
behavioral1
Sample
7ab93eaeefca77b3f62423fd50fdd8b0_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
213.152.161.170:3838
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
bbNhUENb
-
offline_keylogger
true
-
password
password123!&%@$^%RRSaaRS5
-
registry_autorun
true
-
startup_name
Adobe
-
use_mutex
true
Targets
-
-
Target
7ab93eaeefca77b3f62423fd50fdd8b0_JaffaCakes118
-
Size
184KB
-
MD5
7ab93eaeefca77b3f62423fd50fdd8b0
-
SHA1
f1728c4881f0d785091d2750a4d9fac262d1fb1b
-
SHA256
1f1d004892a65a3261de01619f65c00601cac8c71be12c78c28f56b482f4ca7f
-
SHA512
6bdad3406116b0749e16cdc24df00ea4a6220f5590ffbc809d984070a9fa302c9af317f2f2011b978bce747bfb200f0969d9d95e5f1e0d6f2a59d49f71906fcb
-
SSDEEP
3072:SgfEqooIOGtISZ8V7WY3FHE5Oag+/GRuUtqFKFXejO:G5OG2Ss71FaO+G00qFWuS
-
NetWire RAT payload
-
Netwire family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-