General
-
Target
88b5c3815cfdfef5228639012e4986d7_JaffaCakes118
-
Size
784KB
-
Sample
241103-av41dsspgn
-
MD5
88b5c3815cfdfef5228639012e4986d7
-
SHA1
9656604b92b4ba9566fe3849f5c0d6b64e96ff14
-
SHA256
d8da15629bf6fe08338b2b09c519c124cbbf99c75f5780f2c75955f704e5b29b
-
SHA512
9e537ffbff7184a3873b26d5d9b346ed3d3fd7f157433612d65cef46f9121a9934b0d075027e2abbc86324c0747f66693851b04252ada18c2943fe52b0c6b5af
-
SSDEEP
24576:f2O/GlATW0TUAbxhhrWtSpHwmxhKbH3rUO46GH:3i0Fr9pHwmxUT3iv
Static task
static1
Behavioral task
behavioral1
Sample
88b5c3815cfdfef5228639012e4986d7_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
5.133.11.63:4068
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Pedro1234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
88b5c3815cfdfef5228639012e4986d7_JaffaCakes118
-
Size
784KB
-
MD5
88b5c3815cfdfef5228639012e4986d7
-
SHA1
9656604b92b4ba9566fe3849f5c0d6b64e96ff14
-
SHA256
d8da15629bf6fe08338b2b09c519c124cbbf99c75f5780f2c75955f704e5b29b
-
SHA512
9e537ffbff7184a3873b26d5d9b346ed3d3fd7f157433612d65cef46f9121a9934b0d075027e2abbc86324c0747f66693851b04252ada18c2943fe52b0c6b5af
-
SSDEEP
24576:f2O/GlATW0TUAbxhhrWtSpHwmxhKbH3rUO46GH:3i0Fr9pHwmxUT3iv
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-