General
-
Target
JaffaCakes118_b63757a2f92f47504fbb8209974df675376e1ede02df49b2619beb59281955cb
-
Size
197KB
-
Sample
241225-a1b7kaskf1
-
MD5
4a09615143f883c7ff789d10f982562f
-
SHA1
8627c133145d1d57ed4c57abce56bacf82dc70a2
-
SHA256
b63757a2f92f47504fbb8209974df675376e1ede02df49b2619beb59281955cb
-
SHA512
ec67bc75fee73523b6eebe26bd32c3ae57b6c1a9130a580a8cad708ec02684717134bcb990f2ef5cc9d84146ec8d60171a9f9289e10ee68c1d47767e12a1fad1
-
SSDEEP
6144:f6cwe2Dp8YLLkzm2pew+/se463IlFVoXl06Y2:Sxe2QAwSQiILVoah2
Static task
static1
Behavioral task
behavioral1
Sample
a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
wealthymachine.ddns.net:39560
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
sunshineslisa
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad
-
Size
261KB
-
MD5
b11998e748a73de0094e9c8a742225e6
-
SHA1
d7ec09cd52c1f0e2f6d21dfda48689d51b7a4840
-
SHA256
a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad
-
SHA512
210e60c67a5dca1376698e41df5ea7c483b5ca353e767d21405074bade4d44bcbf576ccb9437baba4ce9bc85bec8d963975a69c0286318232e2bc8793b935794
-
SSDEEP
6144:ZNJfAJdpbgneJK2BPqWOyJAGovjNcjat9w44mZ/M:STFgeE2BbOIrovjm+934U
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-