General

  • Target

    JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b

  • Size

    687KB

  • Sample

    250108-gggq9swqh1

  • MD5

    8ec57ed96acbf703ffce25d772b9456b

  • SHA1

    dc9b2ad36eca610c4648ad52d748321377c0d089

  • SHA256

    aa678a0d186a699538402b004c68a19305ccc364f8d2b74eb07ccec9a0eecd55

  • SHA512

    89613cf7e4999d36c27e6e871046cecfd0e81af66e0a3d4a8a28ad870d5ac09e631fb5e5495415472b79ebb779727a1086ffc5038e1a12cfcb71b76f09352a14

  • SSDEEP

    12288:DAlwC3XcfrcZ68FCAYNETcGoImVs8J2mQ1+qSJ8l61wfgRyw:cwOkCdYNETcDIj8Q/1+rJAtfF

Malware Config

Extracted

Family

netwire

C2

corected0.duckdns.org:54213

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\FuTrU\Logs\

  • lock_executable

    true

  • mutex

    ueAtXIon

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b

    • Size

      687KB

    • MD5

      8ec57ed96acbf703ffce25d772b9456b

    • SHA1

      dc9b2ad36eca610c4648ad52d748321377c0d089

    • SHA256

      aa678a0d186a699538402b004c68a19305ccc364f8d2b74eb07ccec9a0eecd55

    • SHA512

      89613cf7e4999d36c27e6e871046cecfd0e81af66e0a3d4a8a28ad870d5ac09e631fb5e5495415472b79ebb779727a1086ffc5038e1a12cfcb71b76f09352a14

    • SSDEEP

      12288:DAlwC3XcfrcZ68FCAYNETcGoImVs8J2mQ1+qSJ8l61wfgRyw:cwOkCdYNETcDIj8Q/1+rJAtfF

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks