General

  • Target

    e49c09156be771b3d16101905e9fa96f_JaffaCakes118

  • Size

    275KB

  • Sample

    240916-mv42lstbpc

  • MD5

    e49c09156be771b3d16101905e9fa96f

  • SHA1

    fe4436364fef2faea57bcf26e9d2a3e1e77224ad

  • SHA256

    1081a008943d8c67a28d92519792534bd58927cc3f5a010cf4f1ffb04ef5ae04

  • SHA512

    7db85fb962610a49f934dfe87afa953f29abaf0d84c18236c101dd3a2f9b99d5bc2c00b7991a15ae2d4cc0f7a9ddc43e8ac25fa47775bd6c894bf69d1f02a4a8

  • SSDEEP

    3072:X3ZnQm4mdfCnsXBF3a/zfFitmrafgDgn+MryVVBJut7wuJhT4wOWq99Szv1ljhqb:n2m4mdKyFKzFOHfgDwK4R5OWq99SzLz

Malware Config

Extracted

Family

netwire

C2

fingers1.ddns.net:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      e49c09156be771b3d16101905e9fa96f_JaffaCakes118

    • Size

      275KB

    • MD5

      e49c09156be771b3d16101905e9fa96f

    • SHA1

      fe4436364fef2faea57bcf26e9d2a3e1e77224ad

    • SHA256

      1081a008943d8c67a28d92519792534bd58927cc3f5a010cf4f1ffb04ef5ae04

    • SHA512

      7db85fb962610a49f934dfe87afa953f29abaf0d84c18236c101dd3a2f9b99d5bc2c00b7991a15ae2d4cc0f7a9ddc43e8ac25fa47775bd6c894bf69d1f02a4a8

    • SSDEEP

      3072:X3ZnQm4mdfCnsXBF3a/zfFitmrafgDgn+MryVVBJut7wuJhT4wOWq99Szv1ljhqb:n2m4mdKyFKzFOHfgDwK4R5OWq99SzLz

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks