General

  • Target

    66ae237c1680a6c0194d4a5ef883a146_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241021-pcckrataqd

  • MD5

    66ae237c1680a6c0194d4a5ef883a146

  • SHA1

    7c37067d047caae8b5ca9127a6b89845e833c520

  • SHA256

    282e441b58eed38ce5b5aeae04ad6d174ff23b8c7a6ced664c54b683f8cfc8ab

  • SHA512

    894d8f621a240f99bf9914c2efe2205b61cedf16573a559020616e26dc47f8cdf9fc4f063ed8a1b46e6ca51baa4f5cda317d60aa3649f0af90abdbc88ddca5a0

  • SSDEEP

    24576:AAOcZwdf+OD0+5PYjasPw5X1WelwB1rABQ8iHX0eFpPFbKi6FGxGIsDCabnd:ef5wja2ayfmgpPFbKi6kxxK1bnd

Malware Config

Extracted

Family

netwire

C2

harold.ns01.info:3606

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Netwir

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    pHJVBoFH

  • offline_keylogger

    true

  • password

    master12

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      66ae237c1680a6c0194d4a5ef883a146_JaffaCakes118

    • Size

      1.5MB

    • MD5

      66ae237c1680a6c0194d4a5ef883a146

    • SHA1

      7c37067d047caae8b5ca9127a6b89845e833c520

    • SHA256

      282e441b58eed38ce5b5aeae04ad6d174ff23b8c7a6ced664c54b683f8cfc8ab

    • SHA512

      894d8f621a240f99bf9914c2efe2205b61cedf16573a559020616e26dc47f8cdf9fc4f063ed8a1b46e6ca51baa4f5cda317d60aa3649f0af90abdbc88ddca5a0

    • SSDEEP

      24576:AAOcZwdf+OD0+5PYjasPw5X1WelwB1rABQ8iHX0eFpPFbKi6FGxGIsDCabnd:ef5wja2ayfmgpPFbKi6kxxK1bnd

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks