General

  • Target

    55f0ddfd4b3332e653f4ad6c5eb64367_JaffaCakes118

  • Size

    216KB

  • Sample

    240518-v25kqafa26

  • MD5

    55f0ddfd4b3332e653f4ad6c5eb64367

  • SHA1

    de38b7d892416e635b36eb72171e305ddcf48ca0

  • SHA256

    436d1db0f9b341dc7f950c7d013f183f17e26c35832a2a048bb02ab95621693f

  • SHA512

    65ab63fa46e7da97d6dac059a7f759b191030dd774fac61aeee6e1f91bda0f98862ff795ba3c99b987ae061ad013478a0e12c27a89ca25904cda2b0b1dc15089

  • SSDEEP

    6144:b8BZaWmtoip7jNcOFwf077vd6KVfSze5YqOYb:4BZ+qiljNbFwf8cMfSi5tj

Malware Config

Extracted

Family

netwire

C2

88.150.138.72:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      55f0ddfd4b3332e653f4ad6c5eb64367_JaffaCakes118

    • Size

      216KB

    • MD5

      55f0ddfd4b3332e653f4ad6c5eb64367

    • SHA1

      de38b7d892416e635b36eb72171e305ddcf48ca0

    • SHA256

      436d1db0f9b341dc7f950c7d013f183f17e26c35832a2a048bb02ab95621693f

    • SHA512

      65ab63fa46e7da97d6dac059a7f759b191030dd774fac61aeee6e1f91bda0f98862ff795ba3c99b987ae061ad013478a0e12c27a89ca25904cda2b0b1dc15089

    • SSDEEP

      6144:b8BZaWmtoip7jNcOFwf077vd6KVfSze5YqOYb:4BZ+qiljNbFwf8cMfSi5tj

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks