General
-
Target
a9ea5e73237d3e45ef3b2bab04612266_JaffaCakes118
-
Size
321KB
-
Sample
240614-qqxcrasena
-
MD5
a9ea5e73237d3e45ef3b2bab04612266
-
SHA1
8113bbeb5c04e214e6ae04c9e90aa4c8ee84d3b4
-
SHA256
5d97562c21e9b2f0959963447c9454e3247390fbbb281ca2c2ef2a9c6c7de777
-
SHA512
e85d9268718d987efa1bc308f9f957d65848d961b9bf39a97a82d6879d936c493d8a5341c0e07b0abf5362124f711ebc5695915b8ca4aeb1141dc3a64c5c5dcc
-
SSDEEP
6144:QdWgj21o19KzuuYOgmWkLBTjOB1mQUgQvPwjxG8A59VdxghunhmzgRhsJqB/:Qop169KSejWUOjmQUgQvPwjE8evihuhN
Static task
static1
Behavioral task
behavioral1
Sample
a9ea5e73237d3e45ef3b2bab04612266_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9ea5e73237d3e45ef3b2bab04612266_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
mlhdns.phatbois.me:4772
mlhdns.pandabearsunited.xyz:4772
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
a9ea5e73237d3e45ef3b2bab04612266_JaffaCakes118
-
Size
321KB
-
MD5
a9ea5e73237d3e45ef3b2bab04612266
-
SHA1
8113bbeb5c04e214e6ae04c9e90aa4c8ee84d3b4
-
SHA256
5d97562c21e9b2f0959963447c9454e3247390fbbb281ca2c2ef2a9c6c7de777
-
SHA512
e85d9268718d987efa1bc308f9f957d65848d961b9bf39a97a82d6879d936c493d8a5341c0e07b0abf5362124f711ebc5695915b8ca4aeb1141dc3a64c5c5dcc
-
SSDEEP
6144:QdWgj21o19KzuuYOgmWkLBTjOB1mQUgQvPwjxG8A59VdxghunhmzgRhsJqB/:Qop169KSejWUOjmQUgQvPwjE8evihuhN
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-