General

  • Target

    22fdd463516582006bd3c3ba37a69990_JaffaCakes118

  • Size

    234KB

  • Sample

    240508-dzhvhaag74

  • MD5

    22fdd463516582006bd3c3ba37a69990

  • SHA1

    faa35727a47b1f88a00fc1e461d7c2fb121e59c2

  • SHA256

    e08efea8d17531982443853a53e69c195de78486bd62ae2ad384cad547bdbb36

  • SHA512

    dcec872047d54bbb9c9398f654f1b739ae274fbc5a4c65c5612d141eac36f1cb214870f331515b7b7183eff61e8ae33244301815067418c2230434166b0dc208

  • SSDEEP

    6144:NW7B0DH2c6AVeLN9Ik8L6VaGm2oyntqZFRzK:47+xeLN9Ik8e82oynE9K

Malware Config

Extracted

Family

netwire

C2

ml.warzonedns.com:4772

bright1.awsmppl.com:4772

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Hope

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      22fdd463516582006bd3c3ba37a69990_JaffaCakes118

    • Size

      234KB

    • MD5

      22fdd463516582006bd3c3ba37a69990

    • SHA1

      faa35727a47b1f88a00fc1e461d7c2fb121e59c2

    • SHA256

      e08efea8d17531982443853a53e69c195de78486bd62ae2ad384cad547bdbb36

    • SHA512

      dcec872047d54bbb9c9398f654f1b739ae274fbc5a4c65c5612d141eac36f1cb214870f331515b7b7183eff61e8ae33244301815067418c2230434166b0dc208

    • SSDEEP

      6144:NW7B0DH2c6AVeLN9Ik8L6VaGm2oyntqZFRzK:47+xeLN9Ik8e82oynE9K

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks