General
-
Target
JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b
-
Size
687KB
-
Sample
250108-gggq9swqh1
-
MD5
8ec57ed96acbf703ffce25d772b9456b
-
SHA1
dc9b2ad36eca610c4648ad52d748321377c0d089
-
SHA256
aa678a0d186a699538402b004c68a19305ccc364f8d2b74eb07ccec9a0eecd55
-
SHA512
89613cf7e4999d36c27e6e871046cecfd0e81af66e0a3d4a8a28ad870d5ac09e631fb5e5495415472b79ebb779727a1086ffc5038e1a12cfcb71b76f09352a14
-
SSDEEP
12288:DAlwC3XcfrcZ68FCAYNETcGoImVs8J2mQ1+qSJ8l61wfgRyw:cwOkCdYNETcDIj8Q/1+rJAtfF
Behavioral task
behavioral1
Sample
JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe
Resource
win7-20240729-en
Malware Config
Extracted
netwire
corected0.duckdns.org:54213
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\FuTrU\Logs\
-
lock_executable
true
-
mutex
ueAtXIon
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b
-
Size
687KB
-
MD5
8ec57ed96acbf703ffce25d772b9456b
-
SHA1
dc9b2ad36eca610c4648ad52d748321377c0d089
-
SHA256
aa678a0d186a699538402b004c68a19305ccc364f8d2b74eb07ccec9a0eecd55
-
SHA512
89613cf7e4999d36c27e6e871046cecfd0e81af66e0a3d4a8a28ad870d5ac09e631fb5e5495415472b79ebb779727a1086ffc5038e1a12cfcb71b76f09352a14
-
SSDEEP
12288:DAlwC3XcfrcZ68FCAYNETcGoImVs8J2mQ1+qSJ8l61wfgRyw:cwOkCdYNETcDIj8Q/1+rJAtfF
-
NetWire RAT payload
-
Netwire family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-