General

  • Target

    07d3f408cb66bd51ae5d7fd58d1e7991_JaffaCakes118

  • Size

    390KB

  • Sample

    240429-rae9zacc49

  • MD5

    07d3f408cb66bd51ae5d7fd58d1e7991

  • SHA1

    9087f100be3e3f3a650a28f824b061fc2c916116

  • SHA256

    29f8a1d4aa07493ccaa78aacf27a1610b68cbff589ff6c4559ff82ef5f4a4d17

  • SHA512

    2c7ffb7bdadc75dc2250800b21e765e4559a93fd0793d544fff0f37a59987ffa9f775cd33ae6bd70b79d3a3afbce5cd8009558569fab2f2559c1adef06fa56ce

  • SSDEEP

    6144:GqeYS7STC5zYKP8/5tIzezARZ+qugPkxzAIjZ3Wf5hMEW7y5Nmbv6nsj:KQDbcdR4qugPkN7jMf5hLkbv6n

Malware Config

Extracted

Family

netwire

C2

info1.duckdns.org:5552

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-5552

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    JPXWkodD

  • offline_keylogger

    true

  • password

    caster

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      07d3f408cb66bd51ae5d7fd58d1e7991_JaffaCakes118

    • Size

      390KB

    • MD5

      07d3f408cb66bd51ae5d7fd58d1e7991

    • SHA1

      9087f100be3e3f3a650a28f824b061fc2c916116

    • SHA256

      29f8a1d4aa07493ccaa78aacf27a1610b68cbff589ff6c4559ff82ef5f4a4d17

    • SHA512

      2c7ffb7bdadc75dc2250800b21e765e4559a93fd0793d544fff0f37a59987ffa9f775cd33ae6bd70b79d3a3afbce5cd8009558569fab2f2559c1adef06fa56ce

    • SSDEEP

      6144:GqeYS7STC5zYKP8/5tIzezARZ+qugPkxzAIjZ3Wf5hMEW7y5Nmbv6nsj:KQDbcdR4qugPkN7jMf5hLkbv6n

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks