General
-
Target
JaffaCakes118_9a228e0b3c3045347437fea03f4f54029f5ae0d98d48c3e84683a67c4cd36960
-
Size
317KB
-
Sample
241230-yw3eysyrfz
-
MD5
a7c59c7d37b243df368af892ed26a1d2
-
SHA1
3c3673dc7e0d0cc00ecc12a1263962304ea7ca68
-
SHA256
9a228e0b3c3045347437fea03f4f54029f5ae0d98d48c3e84683a67c4cd36960
-
SHA512
908ebcc98c2e3e6ea49a148a26f1d015d091bf36eace5ec0ca32c43fbb72a583f8c083fe1cc23fc5bfde03d7e0a3b5d72e595646f5ecfca416dc1f072c8d29ab
-
SSDEEP
6144:nt22OeXKYcUiUlT6plGz11a1MD9DxkhwyCbIhFP0VP:nPxlOplGm1M9DxkhwyNhqVP
Static task
static1
Behavioral task
behavioral1
Sample
C64A54B3D28B6E21F228CE31252ED060CBC4DF936EA074BB4926B793DBC97D93.exe
Resource
win7-20241010-en
Malware Config
Extracted
https://pastebin.com/raw/UQ6WhkQb
Extracted
https://pastebin.com/raw/cjNL9r6c
Extracted
netwire
alice2019.myftp.biz:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
OSCARO2021
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
C64A54B3D28B6E21F228CE31252ED060CBC4DF936EA074BB4926B793DBC97D93
-
Size
401KB
-
MD5
a07d9930e3a888839daf68ca4486aa4c
-
SHA1
d608ec0dd8f778f5820fb33720256da28e0db19b
-
SHA256
c64a54b3d28b6e21f228ce31252ed060cbc4df936ea074bb4926b793dbc97d93
-
SHA512
bda8cafa576e8e1e30ec0b267a66cfb01c0624339f49ef3dc5901d9ad39b8ca94d813141de49a52956112641b73273121c3c0349e695439748ddfabe71606b7a
-
SSDEEP
12288:7ANwRo+mv8QD4+0V16caYp4SfTgM/gBNkcbma:7AT8QE+kvlfTgTBNkcX
-
NetWire RAT payload
-
Netwire family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-