General
-
Target
c88de0354b6f5f4ea3a22fb2faa80af6_JaffaCakes118
-
Size
384KB
-
Sample
241205-t268wayndm
-
MD5
c88de0354b6f5f4ea3a22fb2faa80af6
-
SHA1
3ab1996451c83e98ea9ab9222f50eb2c50f88f15
-
SHA256
283e202b7318b5849abe2ad06a686dc226cdfe1383697e323eb04400075a9c09
-
SHA512
3b727e8b60d47a82770e8d1deefe1b184f0382590b05c4bce539187301e2c3cb8624a6f15e60fe314f36c5ba7086a86dc60bedac71c420adcc3902747b3af355
-
SSDEEP
6144:ZD4vtzeFLGDFQqFedCM2rpZAD+iu189G9/9UWxdblnQ8:ZSelzr+ta4uWxdb9Q8
Static task
static1
Behavioral task
behavioral1
Sample
c88de0354b6f5f4ea3a22fb2faa80af6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c88de0354b6f5f4ea3a22fb2faa80af6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
netwire
warin.hopto.org:4320
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
c88de0354b6f5f4ea3a22fb2faa80af6_JaffaCakes118
-
Size
384KB
-
MD5
c88de0354b6f5f4ea3a22fb2faa80af6
-
SHA1
3ab1996451c83e98ea9ab9222f50eb2c50f88f15
-
SHA256
283e202b7318b5849abe2ad06a686dc226cdfe1383697e323eb04400075a9c09
-
SHA512
3b727e8b60d47a82770e8d1deefe1b184f0382590b05c4bce539187301e2c3cb8624a6f15e60fe314f36c5ba7086a86dc60bedac71c420adcc3902747b3af355
-
SSDEEP
6144:ZD4vtzeFLGDFQqFedCM2rpZAD+iu189G9/9UWxdblnQ8:ZSelzr+ta4uWxdb9Q8
-
NetWire RAT payload
-
Netwire family
-
Suspicious use of SetThreadContext
-