General

  • Target

    ea0126d07ca352687cd80de06cbcb6f7_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240409-pshfyafa63

  • MD5

    ea0126d07ca352687cd80de06cbcb6f7

  • SHA1

    12dab64dd13e2f6c02c9639e6d88deeadcedcccd

  • SHA256

    508363ac23d75a1e265f6ba9dc64f3fe227ec361f8ebfa21d03bbed7a2c878c0

  • SHA512

    46337c02e847cb6e0e3688d83396584cdad73636c95b8985522183dd0ae440ba4ef45eaa77e62de83c3c81ecc23366bcd58a575384776295932b0ba280663fb0

  • SSDEEP

    24576:AAOcZwdf+OD0+Oxbuk8E33NtEFd9imt3fO+veij:efOxbuhs4zj

Malware Config

Extracted

Family

netwire

C2

harold.ns01.info:3606

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Netwir

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    pHJVBoFH

  • offline_keylogger

    true

  • password

    master12

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      ea0126d07ca352687cd80de06cbcb6f7_JaffaCakes118

    • Size

      1.2MB

    • MD5

      ea0126d07ca352687cd80de06cbcb6f7

    • SHA1

      12dab64dd13e2f6c02c9639e6d88deeadcedcccd

    • SHA256

      508363ac23d75a1e265f6ba9dc64f3fe227ec361f8ebfa21d03bbed7a2c878c0

    • SHA512

      46337c02e847cb6e0e3688d83396584cdad73636c95b8985522183dd0ae440ba4ef45eaa77e62de83c3c81ecc23366bcd58a575384776295932b0ba280663fb0

    • SSDEEP

      24576:AAOcZwdf+OD0+Oxbuk8E33NtEFd9imt3fO+veij:efOxbuhs4zj

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks