General
-
Target
JaffaCakes118_d3dd0f3d4b427de25cc97fc7edbeedb424389ae3e6f50ed7a015c896a6a9130a
-
Size
637KB
-
Sample
241222-kp6xxasjcl
-
MD5
f5980780af35c71e0dd4ba8b4115733d
-
SHA1
b05aa682cf7034ea2c8e0588e29dd26861ec293d
-
SHA256
d3dd0f3d4b427de25cc97fc7edbeedb424389ae3e6f50ed7a015c896a6a9130a
-
SHA512
21ee05413e6fa2b1def02aeb2d11754ff82cd5243acc44226dccb21da76d6b83ba9db5c1d8c59f00966d9e70e03c22292479fe072c9d63e2557990373f222ab1
-
SSDEEP
12288:Yur9/l2hRBa/6eG7lI+Z5yNyVt3GPOwSNVN9N+EYNY4OwGfTQObHYOIDW0:lr9tdNSlQ9P/SNL2EYNY4OwY8OriW0
Static task
static1
Behavioral task
behavioral1
Sample
AUTHORIZATION-FORM.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
podzeye2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
AUTHORIZATION-FORM.exe
-
Size
885KB
-
MD5
e27ae78966913daae0ee311ad3183814
-
SHA1
ea2f948d948f11a56017c3619660f93cee235046
-
SHA256
22a7c02eac7f7940eba9afa9ca51a179789e22257ffe87cbab02c15360a9fded
-
SHA512
1e5f3c2d216eef94b8268526c56acb022dc80c716759fb098aced1ef25e0d00b92d7fa8d1a8769ceca688256d28cd42c9a922fe623529c9184b29aecb9b669d5
-
SSDEEP
24576:HO/LH9oyLJnMO6sH0VVyiJj374rqVe/t5oyBMRov:uTySOhMqr414mLv
-
NetWire RAT payload
-
Netwire family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-