General
-
Target
df9a54881d2ddaf302ed481e7fc7f5a1_JaffaCakes118
-
Size
158KB
-
Sample
241211-db4gasxlcm
-
MD5
df9a54881d2ddaf302ed481e7fc7f5a1
-
SHA1
b00d24913076bfc4e8f545eb20356ea6330ab8dd
-
SHA256
22147dc4db0fbb2e9dfa8632f2a641c3510c208da9b821cde79a8e509838e5c5
-
SHA512
94aea410e1c32e6c286a4f16ffd6ab0d96af90edef951917deb990c105a553ed9cae4af3eabaf8dd58a82504f211a4bb0134c7ef9c96986c1dcfd1a4fe0a5b05
-
SSDEEP
3072:SA5umrT50bT3iwP8G7Zhn4ENoC8NWtVBGqJnFs51Z/s8OUyMhGiWxoLgQj:SA9Sb7ioBb4uR2WtLS1Z/s8O28xoj
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT-INVOICE-OVERDUE98878787-EXEL.exe
Resource
win7-20240729-en
Malware Config
Extracted
netwire
okenwamothermary.duckdns.org:1104
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
PAYMENT-INVOICE-OVERDUE98878787-EXEL.exe
-
Size
318KB
-
MD5
d1fab92d9a0b56af8b93dcad4a8ebe35
-
SHA1
829796e4d2bbc09627eb498e61d6e48daf273095
-
SHA256
a42fdf3685f82a662136a36099ba05ef38d2282fac999ce29d4dc183f8bfb01a
-
SHA512
1411c30ef43a5a4de232374057eeec6e7739e32f824535051dac1faf5a9971fcbb9467959e0fb8b134ec8baea98079f60d83da29c145396c5fbb1460d29d0cea
-
SSDEEP
6144:Ez4q0llllllllllJTPFSoPZsesGA14bFAI1uWv7CWwPaAF:EXQTPQoBsesGycF1Pv7wPaAF
-
NetWire RAT payload
-
Netwire family
-
Suspicious use of SetThreadContext
-