General

  • Target

    73533280097647.exe

  • Size

    622KB

  • Sample

    200707-f438bmmyfs

  • MD5

    cbbdf22fa1411ba58d30eadcaed48314

  • SHA1

    c7f36a26a7083348b3b390b763d82463e21bfa28

  • SHA256

    6f6a327875691d7d61cdb1e73bbe10e1252493f9e8b2a9c5b0ea31fcc6c38925

  • SHA512

    d49f320f72b191fb43f15c26cc791c218fc480cc48f488fe2b6aaca7210755e434e02cf083abdc6c394aed04c101e7966bfc2dac25edf31ce465c9e6ba8c5a84

Malware Config

Targets

    • Target

      73533280097647.exe

    • Size

      622KB

    • MD5

      cbbdf22fa1411ba58d30eadcaed48314

    • SHA1

      c7f36a26a7083348b3b390b763d82463e21bfa28

    • SHA256

      6f6a327875691d7d61cdb1e73bbe10e1252493f9e8b2a9c5b0ea31fcc6c38925

    • SHA512

      d49f320f72b191fb43f15c26cc791c218fc480cc48f488fe2b6aaca7210755e434e02cf083abdc6c394aed04c101e7966bfc2dac25edf31ce465c9e6ba8c5a84

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks