General
-
Target
JaffaCakes118_63f1c69cab92510cb09263e7a1fa636b441a41250da1ca85046544bf580aca9d
-
Size
54.6MB
-
Sample
241223-xws1vayjfp
-
MD5
1a4e636db05d2f464afc14499a15d340
-
SHA1
2c734f47f5b585dc7fe185e171ea2d0057bf23c9
-
SHA256
63f1c69cab92510cb09263e7a1fa636b441a41250da1ca85046544bf580aca9d
-
SHA512
d9c8fb48cd33a63e502858db4af8d2e66a3fddd794687089264ad9ebf97dd09cff06894b001a9a62e0bf3a50ece3869cea103aa7974894ac095330325fbbc38b
-
SSDEEP
1572864:ehb5hAUvIT15MCmAH0Zw4+iu1lHtpHYxx:ehbTvw16CmA6V+NdHYxx
Static task
static1
Behavioral task
behavioral1
Sample
8D8C50D15D14F3C82B0E8FD020C6DA47594E7B3FDA3997FAC8DDAE3F0B7050FD.exe
Resource
win7-20240903-en
Malware Config
Extracted
https://i.top4top.io/m_1891i29ay1.mp4
Extracted
netwire
alice2019.myftp.biz:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
FRAPPE2021
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
8D8C50D15D14F3C82B0E8FD020C6DA47594E7B3FDA3997FAC8DDAE3F0B7050FD
-
Size
54.7MB
-
MD5
457576e35c46938aeffa39b5ba30be14
-
SHA1
9d0e24a4c6af1869605f6a90f39c27088e2cc155
-
SHA256
8d8c50d15d14f3c82b0e8fd020c6da47594e7b3fda3997fac8ddae3f0b7050fd
-
SHA512
d2c186073e2868283f56ed5fe69b7f8076b6a126301b759bad326e2501360f1792ca4361c5056782f09398483903d72a989c489ef8ca23ccc686c6b31622a7bd
-
SSDEEP
1572864:SHLQQYsZrYdPUvlFXMNAU+Dg+0PvILwy8d+lr2f:SrQrsZMqdFXW4Dglv0z8dUC
-
NetWire RAT payload
-
Netwire family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1