General

  • Target

    50a652b21941da40d9fca80d12bd35f8_JaffaCakes118

  • Size

    324KB

  • Sample

    240517-v3cw4aae85

  • MD5

    50a652b21941da40d9fca80d12bd35f8

  • SHA1

    b7cf2f941503dcb9167e9fcaf8a159c741161fbd

  • SHA256

    666a8dbc172bcf7cd698bf95e5b58de17535121fed7de5ce1349db4446a1fa5c

  • SHA512

    6ba80cc4748213b4c83e17c852414bc7815fa7345ff70caf44744d1a94eccec2ca40c37b464cebd4c946d41ecaa6c2e475fc0d00adda15b18f223be8053ad79e

  • SSDEEP

    6144:8Pb+JB1nuNURlRBOipj5W01NSVsJipfBDNcjat9w44ml5:pYMjF+V7hBDm+934Y

Malware Config

Extracted

Family

netwire

C2

88.150.189.103:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      50a652b21941da40d9fca80d12bd35f8_JaffaCakes118

    • Size

      324KB

    • MD5

      50a652b21941da40d9fca80d12bd35f8

    • SHA1

      b7cf2f941503dcb9167e9fcaf8a159c741161fbd

    • SHA256

      666a8dbc172bcf7cd698bf95e5b58de17535121fed7de5ce1349db4446a1fa5c

    • SHA512

      6ba80cc4748213b4c83e17c852414bc7815fa7345ff70caf44744d1a94eccec2ca40c37b464cebd4c946d41ecaa6c2e475fc0d00adda15b18f223be8053ad79e

    • SSDEEP

      6144:8Pb+JB1nuNURlRBOipj5W01NSVsJipfBDNcjat9w44ml5:pYMjF+V7hBDm+934Y

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks