General

  • Target

    8736d4b3663567fa4350ce83083f0bcb_JaffaCakes118

  • Size

    567KB

  • Sample

    240531-q32g8sbb68

  • MD5

    8736d4b3663567fa4350ce83083f0bcb

  • SHA1

    e91f34ea5e741402eb6fb4ca9c16e703928a5af2

  • SHA256

    2b4a6ef807924dd10f65081a11ad5193c9334e9c8aea22cf0cfd90a65193d626

  • SHA512

    a01a2183d4e9d0113dad8c65908c4d826f2f448fbbece61d1ad6bcd617a49a942bccd7ef63e374d6a93fcd87291ededb4ad8c58c6c10d81bc655acd073b46539

  • SSDEEP

    12288:RM/VGR9lbM/VGR9leCOPUv8iMsVfmU8lRVrN:G/VGe/VG6s0iMgf8lRVrN

Malware Config

Extracted

Family

netwire

C2

cncbtc.zapto.org:3360

btcloldab.ddns.net:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    uGcjuNnv

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      8736d4b3663567fa4350ce83083f0bcb_JaffaCakes118

    • Size

      567KB

    • MD5

      8736d4b3663567fa4350ce83083f0bcb

    • SHA1

      e91f34ea5e741402eb6fb4ca9c16e703928a5af2

    • SHA256

      2b4a6ef807924dd10f65081a11ad5193c9334e9c8aea22cf0cfd90a65193d626

    • SHA512

      a01a2183d4e9d0113dad8c65908c4d826f2f448fbbece61d1ad6bcd617a49a942bccd7ef63e374d6a93fcd87291ededb4ad8c58c6c10d81bc655acd073b46539

    • SSDEEP

      12288:RM/VGR9lbM/VGR9leCOPUv8iMsVfmU8lRVrN:G/VGe/VG6s0iMgf8lRVrN

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks