General

  • Target

    a425430c98ab5080f1f5e5eb24adc809_JaffaCakes118

  • Size

    430KB

  • Sample

    240817-zy55asxamh

  • MD5

    a425430c98ab5080f1f5e5eb24adc809

  • SHA1

    7e2aa0bde6d621aa7242e81a98ab4a32c48fa90b

  • SHA256

    51ffc7a0d345b5b01709f51fb8e6c3dd178fb89adccd7a3aad8cb0d6584f320d

  • SHA512

    22cade5dd1b22cb9fd9b09aa3f8dbcb92873a7fccfc0be509e422d7c73c3d4e73878af1735db90100e475c12b707f3f4a1a32386a644594679c576afcc7105cb

  • SSDEEP

    12288:3qyiJgwUCVVc8bUaRNjaddCpZiiyG+GJ0n0x/wkXq:LwUCVVTbUabioZBfUm4P

Malware Config

Extracted

Family

netwire

C2

sydor.tjsosda.com:5563

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    FRESH

  • install_path

    %AppData%\Install\msc0nfig.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Qx7cUxUUgS

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      Eurobelt RFQ 203345_20200626100122637_PDF.exe

    • Size

      566KB

    • MD5

      e84685ec0b33fb56abead1aaf166b8ad

    • SHA1

      ea3d03757c1d1c053abe433a28fedc48eb28a6a1

    • SHA256

      e6db6d5f9019bdefffc749264a267c1927dcf5eba5a7ea3dfb10db457b6b2a16

    • SHA512

      49285b13846735cc76d7cd9c2af1e33156c7bcb90ada17e95dadb1b28c86086287813c90bc20640876035de180487622a40b85b96196faefb28bd256eebf578a

    • SSDEEP

      12288:9crNS33L10QdrXP/X+tGfnF2gqm1BRNWXlLslygCoPk6iS:ANA3R5drXPrfF11nNW1LslygH

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks