General

  • Target

    28c7c3357fdbfef80f92ff8d0efd5988_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240509-hkjkpshf99

  • MD5

    28c7c3357fdbfef80f92ff8d0efd5988

  • SHA1

    be02669f64bb74b8de0492ef306ad395439c5037

  • SHA256

    91736aebc292f7aa6a99944d7a217b86616f5dbd86d7505a9dc0e567c508bf5d

  • SHA512

    57b65b4af21cbcc72e3c8c0b18ed7d2531bf5c31e02642bd297f5e456befd87f10b670cbfa8ba2ea1f8cea2902eb4e141328284d3b763d07ca77edf42c9df5ad

  • SSDEEP

    24576:SvpG2Cojx0pB9w/4Bf1ZXgcPDZuRW3Ane7AxFzEhed1r9:r2bx60/4B3NDcAwe7y+heR

Malware Config

Extracted

Family

netwire

C2

pd1n.ddns.net:1968

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    pd1n-noip

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Kimbolsapoq!P12

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      28c7c3357fdbfef80f92ff8d0efd5988_JaffaCakes118

    • Size

      1.2MB

    • MD5

      28c7c3357fdbfef80f92ff8d0efd5988

    • SHA1

      be02669f64bb74b8de0492ef306ad395439c5037

    • SHA256

      91736aebc292f7aa6a99944d7a217b86616f5dbd86d7505a9dc0e567c508bf5d

    • SHA512

      57b65b4af21cbcc72e3c8c0b18ed7d2531bf5c31e02642bd297f5e456befd87f10b670cbfa8ba2ea1f8cea2902eb4e141328284d3b763d07ca77edf42c9df5ad

    • SSDEEP

      24576:SvpG2Cojx0pB9w/4Bf1ZXgcPDZuRW3Ane7AxFzEhed1r9:r2bx60/4B3NDcAwe7y+heR

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks