General

  • Target

    f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118

  • Size

    363KB

  • Sample

    241215-abnjasyjgv

  • MD5

    f1583cede77b634f2dd7f8807319d4f0

  • SHA1

    5e87a07e3843f7fa3e190ef47f7a8e268e7533c8

  • SHA256

    f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3

  • SHA512

    858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d

  • SSDEEP

    6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu

Malware Config

Extracted

Family

netwire

C2

88.119.175.41:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    Olu

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    iGVOQFlr

  • offline_keylogger

    true

  • password

    Ktgv4%+,%S

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Targets

    • Target

      f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118

    • Size

      363KB

    • MD5

      f1583cede77b634f2dd7f8807319d4f0

    • SHA1

      5e87a07e3843f7fa3e190ef47f7a8e268e7533c8

    • SHA256

      f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3

    • SHA512

      858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d

    • SSDEEP

      6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks