General

  • Target

    JaffaCakes118_bc649578550eaf985a4f3432ee1d0f8f67098d0070956e6d2b3e72d327886be1

  • Size

    673KB

  • Sample

    241229-qc9e6aslek

  • MD5

    3de01cfc88a28b450933fd1df1afdbf3

  • SHA1

    35a4c40afac70bee10cf94e407a99610d8f2fa9c

  • SHA256

    bc649578550eaf985a4f3432ee1d0f8f67098d0070956e6d2b3e72d327886be1

  • SHA512

    98977848eb9351ffff7da4ce7a449159cc34ee6d70ec3a354775b6287324d18569238849a7b019932b033ed470d9c5fa380e4df9a1fb88ca3fa5bb0a0648ffce

  • SSDEEP

    12288:BDVHmvEYKaqOA9PysodZV4teOvkS1bUsXoh2KzLChCWlPxuVinaP1Db6qY+1w10j:BD9mmO+ysa3m/Yh3PfWlPUVinKD21+1z

Malware Config

Extracted

Family

netwire

C2

nowancenorly.ddns.net:6969

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • mutex

    pYeAqduB

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      PO 05252022.exe

    • Size

      735KB

    • MD5

      5d1a42f272e46d9df26b31f6251665c0

    • SHA1

      bbbd7d531fec546873ff859f16ec1ac1a1699051

    • SHA256

      c10214c2ddcb440aa1d8263790d22b4c2c1a48fafa5a2cb48e5192da5cf41fb4

    • SHA512

      0d34adb08997cd2de0b86e228b7c12f575aa7379fb184b3eaed9e13e767b40c1e82f8dd524988c5cb0a6618a267c93d4e7f8707b8f4f2b81103d71b94d6cf883

    • SSDEEP

      12288:/TGZFFOzoUoFUwzciEkJT5Nv4vdwv3c82QgZ31nl4DIKIFReKJxsviT3DmTZAt2S:/BoEk3OdSWFnl4DIKIF0K0veVKFq

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks