General

  • Target

    f08f1aa3c5032ea42e94d0b4e4fb26ff_JaffaCakes118

  • Size

    212KB

  • Sample

    240921-zblgdascrq

  • MD5

    f08f1aa3c5032ea42e94d0b4e4fb26ff

  • SHA1

    302fe72736c735e8b164d8a27a638c47285de9c1

  • SHA256

    0b19af1135b7c65d63c372d0679ad30d18383df55283237f4fcfe57520458599

  • SHA512

    d731bfaa104334a1f7b8f7ecb48332df2fdc26aa51d86da4ce0d77ccc05d052401b1f0dc42cf68903449f6ddb10c1e5a136c76686c84fb4e55bbc57b1fba3f80

  • SSDEEP

    3072:7yoO0nALc8GrtL6idfyGRoa5aO3Me84J95kVuaNTpD9Hm/pmgFMFDKJh:iLcJrtLpVox0msatm/EgFMFeJ

Malware Config

Extracted

Family

netwire

C2

auth.dynns.com:1212

auth.myddns.me:1111

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      f08f1aa3c5032ea42e94d0b4e4fb26ff_JaffaCakes118

    • Size

      212KB

    • MD5

      f08f1aa3c5032ea42e94d0b4e4fb26ff

    • SHA1

      302fe72736c735e8b164d8a27a638c47285de9c1

    • SHA256

      0b19af1135b7c65d63c372d0679ad30d18383df55283237f4fcfe57520458599

    • SHA512

      d731bfaa104334a1f7b8f7ecb48332df2fdc26aa51d86da4ce0d77ccc05d052401b1f0dc42cf68903449f6ddb10c1e5a136c76686c84fb4e55bbc57b1fba3f80

    • SSDEEP

      3072:7yoO0nALc8GrtL6idfyGRoa5aO3Me84J95kVuaNTpD9Hm/pmgFMFDKJh:iLcJrtLpVox0msatm/EgFMFeJ

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks