General

  • Target

    8a937fa1cdb94f6f5e905885db5c0fd0_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240601-qmdfgaeb34

  • MD5

    8a937fa1cdb94f6f5e905885db5c0fd0

  • SHA1

    5ab4f7c95aa8aeaf5eefa236950dd027be98b28f

  • SHA256

    dd38a1eb9c5ce7e1d54168c5a318159cd326161994dab4b2aed1e0d41e44fb75

  • SHA512

    9a35d5b85a6baeee0854568ee1a5a058f19d4660f8068539e094e3f4d06978ae836370d310a5d8754aa75f9c74ae3ceae361e33862db15fc27ece2d9bc6cd323

  • SSDEEP

    24576:EAHnh+eWsN3skA4RV1Hom2KXMmHaqMDuH7mnsm1ZmV6V+5:Th+ZkldoPK8Yaq2vZ6R

Malware Config

Extracted

Family

netwire

C2

lecanoffice.dynu.net:2202

Attributes
  • activex_autorun

    true

  • activex_key

    {5GNR66Y3-78Y4-PMYQ-E1H8-05IS5JYJRW17}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    lolkFUKd

  • offline_keylogger

    true

  • password

    gfffffytt

  • registry_autorun

    true

  • startup_name

    image

  • use_mutex

    true

Targets

    • Target

      8a937fa1cdb94f6f5e905885db5c0fd0_JaffaCakes118

    • Size

      1.3MB

    • MD5

      8a937fa1cdb94f6f5e905885db5c0fd0

    • SHA1

      5ab4f7c95aa8aeaf5eefa236950dd027be98b28f

    • SHA256

      dd38a1eb9c5ce7e1d54168c5a318159cd326161994dab4b2aed1e0d41e44fb75

    • SHA512

      9a35d5b85a6baeee0854568ee1a5a058f19d4660f8068539e094e3f4d06978ae836370d310a5d8754aa75f9c74ae3ceae361e33862db15fc27ece2d9bc6cd323

    • SSDEEP

      24576:EAHnh+eWsN3skA4RV1Hom2KXMmHaqMDuH7mnsm1ZmV6V+5:Th+ZkldoPK8Yaq2vZ6R

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Modifies Installed Components in the registry

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Tasks