General
-
Target
JaffaCakes118_6c33cc232ababa439e295a455f3980a0
-
Size
396KB
-
Sample
250103-m91yhazpds
-
MD5
6c33cc232ababa439e295a455f3980a0
-
SHA1
774365e9521f8087145820b49814d28f37e5c65e
-
SHA256
d1be6471a46b5d2cae582b6bad0646cc3b59c85df440363a77f2bb41ab553e82
-
SHA512
48c9aa276dc7532766865b3159f5d2c9b9f8cb942060ddc1d311eff8a5d3e8a52fa0ae353975a6ea19625c5e7f9a285602784b3ae8f0b5c50f9bdda19c4ce347
-
SSDEEP
3072:LBB+77tPHkDLQ2AhPlG/1WBZf7qF/Z2iYmsdxDxUxt6mDLoGrww9JGbtENmszvZ+:Lf+7ODLQ2GEWBZE22lnNlRRP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
23.95.88.13:3360
-
activex_autorun
true
-
activex_key
{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
doctor
-
registry_autorun
true
-
startup_name
system
-
use_mutex
false
Targets
-
-
Target
JaffaCakes118_6c33cc232ababa439e295a455f3980a0
-
Size
396KB
-
MD5
6c33cc232ababa439e295a455f3980a0
-
SHA1
774365e9521f8087145820b49814d28f37e5c65e
-
SHA256
d1be6471a46b5d2cae582b6bad0646cc3b59c85df440363a77f2bb41ab553e82
-
SHA512
48c9aa276dc7532766865b3159f5d2c9b9f8cb942060ddc1d311eff8a5d3e8a52fa0ae353975a6ea19625c5e7f9a285602784b3ae8f0b5c50f9bdda19c4ce347
-
SSDEEP
3072:LBB+77tPHkDLQ2AhPlG/1WBZf7qF/Z2iYmsdxDxUxt6mDLoGrww9JGbtENmszvZ+:Lf+7ODLQ2GEWBZE22lnNlRRP
-
NetWire RAT payload
-
Netwire family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-