General

  • Target

    bf4913db1ad39960c2d34de82376ced1_JaffaCakes118

  • Size

    594KB

  • Sample

    240824-yhg7vswcpc

  • MD5

    bf4913db1ad39960c2d34de82376ced1

  • SHA1

    e0cf8a8c913421172f7b5675323cc85557d3d102

  • SHA256

    fded53333cec659b61638d4b642ab3a150620b62bd1843ba142a419c168f452d

  • SHA512

    6670050cb893abf80dacce1daf88f0571e031789390d1fdbfca51f4fa95690c7df8d8e2531cdc6288522fd43b6f0e89be66dc5ea51a5de527921b7254bbe2464

  • SSDEEP

    12288:hoAECX/p6U/Kdo7h+DZW8nh4GlPYQJS0omrN59XM7OHgv6nfcWp:ECX/p6US678lTnh4Ag70owNPYOHgv6nf

Malware Config

Extracted

Family

netwire

C2

213.183.58.12:1555

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    suchfamily

  • install_path

    %Temp%\SKYPE.exe

  • keylogger_dir

    %Temp%\Logs\

  • lock_executable

    false

  • mutex

    CBNlDpBK

  • offline_keylogger

    true

  • password

    Hkoco,~E$)

  • registry_autorun

    true

  • startup_name

    SKYPE

  • use_mutex

    true

Targets

    • Target

      bf4913db1ad39960c2d34de82376ced1_JaffaCakes118

    • Size

      594KB

    • MD5

      bf4913db1ad39960c2d34de82376ced1

    • SHA1

      e0cf8a8c913421172f7b5675323cc85557d3d102

    • SHA256

      fded53333cec659b61638d4b642ab3a150620b62bd1843ba142a419c168f452d

    • SHA512

      6670050cb893abf80dacce1daf88f0571e031789390d1fdbfca51f4fa95690c7df8d8e2531cdc6288522fd43b6f0e89be66dc5ea51a5de527921b7254bbe2464

    • SSDEEP

      12288:hoAECX/p6U/Kdo7h+DZW8nh4GlPYQJS0omrN59XM7OHgv6nfcWp:ECX/p6US678lTnh4Ag70owNPYOHgv6nf

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks