General
-
Target
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118
-
Size
363KB
-
Sample
241215-abnjasyjgv
-
MD5
f1583cede77b634f2dd7f8807319d4f0
-
SHA1
5e87a07e3843f7fa3e190ef47f7a8e268e7533c8
-
SHA256
f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3
-
SHA512
858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d
-
SSDEEP
6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu
Static task
static1
Behavioral task
behavioral1
Sample
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
88.119.175.41:3365
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
Olu
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
iGVOQFlr
-
offline_keylogger
true
-
password
Ktgv4%+,%S
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118
-
Size
363KB
-
MD5
f1583cede77b634f2dd7f8807319d4f0
-
SHA1
5e87a07e3843f7fa3e190ef47f7a8e268e7533c8
-
SHA256
f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3
-
SHA512
858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d
-
SSDEEP
6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu
-
NetWire RAT payload
-
Netwire family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-