General

  • Target

    2397b6a1c453e3dfd43a8769c9a075ca_JaffaCakes118

  • Size

    999KB

  • Sample

    240508-g51t2sfa6z

  • MD5

    2397b6a1c453e3dfd43a8769c9a075ca

  • SHA1

    9a921fbffde9b7d9c2b4dabb8d72f43c5cac516d

  • SHA256

    dc0e2ba020204310d3caa9e7ecf71294c5338a0af2262dce14b413aeed026db5

  • SHA512

    a86f4588db1a6a466156e00cde401051158143289d5e8e7ac1f7f373434d56800f3429dcba3698c0b1d2e182552f4822bebe45c03a95b5c965bfd8cdb48a11fe

  • SSDEEP

    24576:bNA3R5drXTLPdNvhRpzmoJ4vkTdy89IoGqZuBUKwT+Zgbri:G5PlhFaoJ4vkTdy8GbqZuGKwT+aPi

Malware Config

Extracted

Family

netwire

C2

5.133.15.5:3389

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    MayPro123

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      2397b6a1c453e3dfd43a8769c9a075ca_JaffaCakes118

    • Size

      999KB

    • MD5

      2397b6a1c453e3dfd43a8769c9a075ca

    • SHA1

      9a921fbffde9b7d9c2b4dabb8d72f43c5cac516d

    • SHA256

      dc0e2ba020204310d3caa9e7ecf71294c5338a0af2262dce14b413aeed026db5

    • SHA512

      a86f4588db1a6a466156e00cde401051158143289d5e8e7ac1f7f373434d56800f3429dcba3698c0b1d2e182552f4822bebe45c03a95b5c965bfd8cdb48a11fe

    • SSDEEP

      24576:bNA3R5drXTLPdNvhRpzmoJ4vkTdy89IoGqZuBUKwT+Zgbri:G5PlhFaoJ4vkTdy8GbqZuGKwT+aPi

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks