General

  • Target

    70d292094bf2dfb83fbe9b2294de3d3b_JaffaCakes118

  • Size

    764KB

  • Sample

    240525-erzzgsec35

  • MD5

    70d292094bf2dfb83fbe9b2294de3d3b

  • SHA1

    1da58ca1d1800afcbbdc0abf12d3a85fd59b8b1e

  • SHA256

    9e6ab216fa2eb58d09b619aa466a0e185f5aed12794f5166dcc15644ac5f9cd8

  • SHA512

    f260c7548bbae3eae2e3f029c2e65f39d60eee1561ec0848c234d6ede32c2b0ab0d4087985613ef16e3fb3fd1eeac3887cb08c28a6c2e6aefbdd47a6f1d69d2a

  • SSDEEP

    12288:OK2mhAMJ/cPlkQDSrXnIeJuD6eLHjW3OPdGaOD/qcfznY6ka/3IF2wOO32AsS2e9:f2O/GlkQDSrTJBYHfd2/ZkafpcTsS2ap

Malware Config

Extracted

Family

netwire

C2

5.133.11.63:4068

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • offline_keylogger

    true

  • password

    Pedro1234

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      70d292094bf2dfb83fbe9b2294de3d3b_JaffaCakes118

    • Size

      764KB

    • MD5

      70d292094bf2dfb83fbe9b2294de3d3b

    • SHA1

      1da58ca1d1800afcbbdc0abf12d3a85fd59b8b1e

    • SHA256

      9e6ab216fa2eb58d09b619aa466a0e185f5aed12794f5166dcc15644ac5f9cd8

    • SHA512

      f260c7548bbae3eae2e3f029c2e65f39d60eee1561ec0848c234d6ede32c2b0ab0d4087985613ef16e3fb3fd1eeac3887cb08c28a6c2e6aefbdd47a6f1d69d2a

    • SSDEEP

      12288:OK2mhAMJ/cPlkQDSrXnIeJuD6eLHjW3OPdGaOD/qcfznY6ka/3IF2wOO32AsS2e9:f2O/GlkQDSrTJBYHfd2/ZkafpcTsS2ap

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks