General
-
Target
JaffaCakes118_bc7663c89073cebc93986a508b544590df0d10658fe349e8504490101fc7e5cd
-
Size
920KB
-
Sample
241222-qpvsjazpfk
-
MD5
ce9b1f8c8d48a92e21db892bf111f19a
-
SHA1
adf6782d2ee003832f4f6a2eec18d7e0e3cb1358
-
SHA256
bc7663c89073cebc93986a508b544590df0d10658fe349e8504490101fc7e5cd
-
SHA512
55e07ba8c1e0fd04885b4c8013bd145b95c1f1f2b386238c735cb17f4d5e153c750902012e384bc07c47b16000c6f148e542c27645d494a78c4ddd0e52323c05
-
SSDEEP
24576:ZWV8R4WcbnuPaR1Pppu/H8alv0rWOu0pzG7kO9wPKt:4VjWcbnOwpvalvUuQD+
Static task
static1
Behavioral task
behavioral1
Sample
4fa7679f4f0241ed1e5d63fbae526ff506dd45c350badb0cbb02f7aca61e0ad5.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4fa7679f4f0241ed1e5d63fbae526ff506dd45c350badb0cbb02f7aca61e0ad5
-
Size
1.2MB
-
MD5
29b108e40acb05c3c9c2fa8c19b166e3
-
SHA1
892c676275a723822d2d47dc1a48defec8bde643
-
SHA256
4fa7679f4f0241ed1e5d63fbae526ff506dd45c350badb0cbb02f7aca61e0ad5
-
SHA512
9cee10259615c90ea51710fd119dc9c8899b8bf4363513ecbc79aa3a69351c68625f5ca5e7c521d2346a54640358eb2deba0fd6db08a7ade5d2970304ad5beb2
-
SSDEEP
24576:peW/uHyRLqHJ/wAmDZtRauPvqz6WQ5YQ9kXRGjr:peW/uSRLeJ4AmDZtPPvqzs5Y+kXRG
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-