General

  • Target

    59eee38795e818fae5079459349e4197_JaffaCakes118

  • Size

    106KB

  • Sample

    240519-mg3xdseb8s

  • MD5

    59eee38795e818fae5079459349e4197

  • SHA1

    0aca798c78941179d1655163dd0e8cc7239c401e

  • SHA256

    2355740dd95da78fd636c7aec92d70b4f9c3d0e35da16cfe300aa0b6a6b830b6

  • SHA512

    5b0ca3d5d4b12d183290fdc8e16a5c6da0f68b8c4d6f53e2a4848e7be8e35393644e2d3a355498a69de41ba6154fbc2eb7a3d1bcc42c0b26a161a9891e6a7cdf

  • SSDEEP

    3072:ROzIy5XGViztldWl88Yed2DQuIAQvQ+d0aYJRX:Ro2ViztvWlvd2UuIAQvQ+yFJR

Malware Config

Extracted

Family

netwire

C2

10.225.76.50:8090

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    HostId-%Test%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    MIUCOqWD

  • offline_keylogger

    true

  • password

    instagram2019

  • registry_autorun

    true

  • startup_name

    Windows Defender

  • use_mutex

    true

Targets

    • Target

      59eee38795e818fae5079459349e4197_JaffaCakes118

    • Size

      106KB

    • MD5

      59eee38795e818fae5079459349e4197

    • SHA1

      0aca798c78941179d1655163dd0e8cc7239c401e

    • SHA256

      2355740dd95da78fd636c7aec92d70b4f9c3d0e35da16cfe300aa0b6a6b830b6

    • SHA512

      5b0ca3d5d4b12d183290fdc8e16a5c6da0f68b8c4d6f53e2a4848e7be8e35393644e2d3a355498a69de41ba6154fbc2eb7a3d1bcc42c0b26a161a9891e6a7cdf

    • SSDEEP

      3072:ROzIy5XGViztldWl88Yed2DQuIAQvQ+d0aYJRX:Ro2ViztvWlvd2UuIAQvQ+yFJR

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks