General
-
Target
dac37ef31af77ad682732e31a77b367e_JaffaCakes118
-
Size
200KB
-
Sample
241209-v7hm5svqhv
-
MD5
dac37ef31af77ad682732e31a77b367e
-
SHA1
08fac654b27bef367e35d365f95bb58817bcc53c
-
SHA256
910c19bc45d9dfebed20bea969b6518403647a4dbda902ce136532c305819b37
-
SHA512
080e2a54c42abfdec15d3f581e9066301dcf32d5fcc3f8922f18354c8086e9e8632fbc93ed6bab8c825e3d57e8c905d8facd4e8f72528e55dc8f71ed5590b5f6
-
SSDEEP
6144:POTcK+NrRioGHlz8rz0i/szQqqDvFfbD8/8g:HK+Nr8MrYi/CqRDD8/
Behavioral task
behavioral1
Sample
dac37ef31af77ad682732e31a77b367e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
haija.mine.nu:1338
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
aegispirate
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
OOxTmvdD
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
true
-
startup_name
chrome
-
use_mutex
true
Targets
-
-
Target
dac37ef31af77ad682732e31a77b367e_JaffaCakes118
-
Size
200KB
-
MD5
dac37ef31af77ad682732e31a77b367e
-
SHA1
08fac654b27bef367e35d365f95bb58817bcc53c
-
SHA256
910c19bc45d9dfebed20bea969b6518403647a4dbda902ce136532c305819b37
-
SHA512
080e2a54c42abfdec15d3f581e9066301dcf32d5fcc3f8922f18354c8086e9e8632fbc93ed6bab8c825e3d57e8c905d8facd4e8f72528e55dc8f71ed5590b5f6
-
SSDEEP
6144:POTcK+NrRioGHlz8rz0i/szQqqDvFfbD8/8g:HK+Nr8MrYi/CqRDD8/
-
NetWire RAT payload
-
Netwire family
-
Core1 .NET packer
Detects packer/loader used by .NET malware.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-