General
-
Target
JaffaCakes118_bc649578550eaf985a4f3432ee1d0f8f67098d0070956e6d2b3e72d327886be1
-
Size
673KB
-
Sample
241229-qc9e6aslek
-
MD5
3de01cfc88a28b450933fd1df1afdbf3
-
SHA1
35a4c40afac70bee10cf94e407a99610d8f2fa9c
-
SHA256
bc649578550eaf985a4f3432ee1d0f8f67098d0070956e6d2b3e72d327886be1
-
SHA512
98977848eb9351ffff7da4ce7a449159cc34ee6d70ec3a354775b6287324d18569238849a7b019932b033ed470d9c5fa380e4df9a1fb88ca3fa5bb0a0648ffce
-
SSDEEP
12288:BDVHmvEYKaqOA9PysodZV4teOvkS1bUsXoh2KzLChCWlPxuVinaP1Db6qY+1w10j:BD9mmO+ysa3m/Yh3PfWlPUVinKD21+1z
Static task
static1
Behavioral task
behavioral1
Sample
PO 05252022.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
nowancenorly.ddns.net:6969
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
mutex
pYeAqduB
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
PO 05252022.exe
-
Size
735KB
-
MD5
5d1a42f272e46d9df26b31f6251665c0
-
SHA1
bbbd7d531fec546873ff859f16ec1ac1a1699051
-
SHA256
c10214c2ddcb440aa1d8263790d22b4c2c1a48fafa5a2cb48e5192da5cf41fb4
-
SHA512
0d34adb08997cd2de0b86e228b7c12f575aa7379fb184b3eaed9e13e767b40c1e82f8dd524988c5cb0a6618a267c93d4e7f8707b8f4f2b81103d71b94d6cf883
-
SSDEEP
12288:/TGZFFOzoUoFUwzciEkJT5Nv4vdwv3c82QgZ31nl4DIKIFReKJxsviT3DmTZAt2S:/BoEk3OdSWFnl4DIKIF0K0veVKFq
-
NetWire RAT payload
-
Netwire family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-