General
-
Target
JaffaCakes118_2f7b31f3520a3ea6fd82959836983acf
-
Size
363KB
-
Sample
250106-vhr6aatqan
-
MD5
2f7b31f3520a3ea6fd82959836983acf
-
SHA1
3648e665640bb02c62f8d67af5df2b5482c063f0
-
SHA256
2889880139ee0b2163ed1234a1eb80e5e0706822b8b632eb00459464d32bce82
-
SHA512
e786fe69647fb7518c0a7f5236c64031020f765a3e4302bc9b8012717bea1295de0c0c8ddba63f589155442081396bbc55f78cacb5b19f3f8308535bf7938fd9
-
SSDEEP
6144:J577n8zu2DqpZUBDc2emIg8bVmNZ47pzmiSTk1GgmVKXGLb2S:L7nqAJmNW74ixGnR
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2f7b31f3520a3ea6fd82959836983acf.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
globalpersonaldns.ddns.net:54984
personalpractice1.hopto.org:54984
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
clients
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
vQSrxiLN
-
offline_keylogger
true
-
password
checkmate123
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
JaffaCakes118_2f7b31f3520a3ea6fd82959836983acf
-
Size
363KB
-
MD5
2f7b31f3520a3ea6fd82959836983acf
-
SHA1
3648e665640bb02c62f8d67af5df2b5482c063f0
-
SHA256
2889880139ee0b2163ed1234a1eb80e5e0706822b8b632eb00459464d32bce82
-
SHA512
e786fe69647fb7518c0a7f5236c64031020f765a3e4302bc9b8012717bea1295de0c0c8ddba63f589155442081396bbc55f78cacb5b19f3f8308535bf7938fd9
-
SSDEEP
6144:J577n8zu2DqpZUBDc2emIg8bVmNZ47pzmiSTk1GgmVKXGLb2S:L7nqAJmNW74ixGnR
-
NetWire RAT payload
-
Netwire family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-