General

  • Target

    d67cad093a0b2cfef0e5bd9c0cbda686_JaffaCakes118

  • Size

    991KB

  • Sample

    241208-l361havpcm

  • MD5

    d67cad093a0b2cfef0e5bd9c0cbda686

  • SHA1

    a4066dc414d26de0bad84780e2a224480b5fc731

  • SHA256

    be7c0ec3f10ce55cc8a321a1fce2de5e095532c5135d847b6a3a11857c73d646

  • SHA512

    c73aa621437e5c6324fff0ba889f2243d1c886ae9477ad30a93b39cf2edc294b30f1af8b89700fac1a0a52e3b6838765e420fd10838780c3471fd5ade9b1f82b

  • SSDEEP

    24576:tgV6rfC5BF3QDwZoW0lD1cgj7Y2qPreXE+xtvWD5+QZp0dO2y:t/fCnFAMZKlJ70jCEYFW1vYO

Malware Config

Extracted

Family

netwire

C2

akamai-update.no-ip.org:33333

Attributes
  • activex_autorun

    true

  • activex_key

    {E7VK76V1-8E7Y-I53I-ET41-C8H4828ISX31}

  • copy_executable

    true

  • delete_original

    true

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Akamai Labs\akmupdate.exe

  • lock_executable

    false

  • mutex

    VesHwCJR

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    true

  • startup_name

    Akamai Labs

  • use_mutex

    true

Targets

    • Target

      d67cad093a0b2cfef0e5bd9c0cbda686_JaffaCakes118

    • Size

      991KB

    • MD5

      d67cad093a0b2cfef0e5bd9c0cbda686

    • SHA1

      a4066dc414d26de0bad84780e2a224480b5fc731

    • SHA256

      be7c0ec3f10ce55cc8a321a1fce2de5e095532c5135d847b6a3a11857c73d646

    • SHA512

      c73aa621437e5c6324fff0ba889f2243d1c886ae9477ad30a93b39cf2edc294b30f1af8b89700fac1a0a52e3b6838765e420fd10838780c3471fd5ade9b1f82b

    • SSDEEP

      24576:tgV6rfC5BF3QDwZoW0lD1cgj7Y2qPreXE+xtvWD5+QZp0dO2y:t/fCnFAMZKlJ70jCEYFW1vYO

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks