General

  • Target

    1c19ec8eb4b0cd8e3531d4527c36f020_JaffaCakes118

  • Size

    782KB

  • Sample

    240506-mqbt9scd85

  • MD5

    1c19ec8eb4b0cd8e3531d4527c36f020

  • SHA1

    786e999d507af2aeb6e46b6ea170da27c82135c3

  • SHA256

    24ec59f7e3c2a9dec81ea257e324c80fdb6cae2927f012527ccad3c7ebd61652

  • SHA512

    25885de600bd9ef48c56b5192f1813d2593ef889ad17cba367ca769320b02db830ba8cfb90c516d529e3eb2e2312bad2800e4f2d58d24645c6cc290ab4dc999e

  • SSDEEP

    12288:OK2mhAMJ/cPlG1Bm7xIFzU/rMpupCBzlrreJA+LmbdjY07+bn1hf3rU6OGPATC+b:f2O/GlGe7Vz/IzwmxhKbH3rUO46GJzx

Malware Config

Extracted

Family

netwire

C2

5.133.11.63:4068

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • offline_keylogger

    true

  • password

    Pedro1234

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      1c19ec8eb4b0cd8e3531d4527c36f020_JaffaCakes118

    • Size

      782KB

    • MD5

      1c19ec8eb4b0cd8e3531d4527c36f020

    • SHA1

      786e999d507af2aeb6e46b6ea170da27c82135c3

    • SHA256

      24ec59f7e3c2a9dec81ea257e324c80fdb6cae2927f012527ccad3c7ebd61652

    • SHA512

      25885de600bd9ef48c56b5192f1813d2593ef889ad17cba367ca769320b02db830ba8cfb90c516d529e3eb2e2312bad2800e4f2d58d24645c6cc290ab4dc999e

    • SSDEEP

      12288:OK2mhAMJ/cPlG1Bm7xIFzU/rMpupCBzlrreJA+LmbdjY07+bn1hf3rU6OGPATC+b:f2O/GlGe7Vz/IzwmxhKbH3rUO46GJzx

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks