General

  • Target

    Potwierdzenie transakcji (3).xls

  • Size

    858KB

  • Sample

    200714-y5mpwxw5g2

  • MD5

    12e613fff7e95373c60b0d323807b14a

  • SHA1

    57ba3149d1204d1be553c2b6f9e057624c148386

  • SHA256

    4ee1e35fc610375d651202f828ea4c0512d1072a13dd72947efb804ea05958d3

  • SHA512

    dfd5602574e753eb57aecdd0ea5c345caca0e0292cd55a7e97ce5785ffae9a143530e27fea047d331b25069f46d688d2c559de3213fb8a56d1599eaa9fb00afd

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://office-service-softs.info/tech.jpg

Targets

    • Target

      Potwierdzenie transakcji (3).xls

    • Size

      858KB

    • MD5

      12e613fff7e95373c60b0d323807b14a

    • SHA1

      57ba3149d1204d1be553c2b6f9e057624c148386

    • SHA256

      4ee1e35fc610375d651202f828ea4c0512d1072a13dd72947efb804ea05958d3

    • SHA512

      dfd5602574e753eb57aecdd0ea5c345caca0e0292cd55a7e97ce5785ffae9a143530e27fea047d331b25069f46d688d2c559de3213fb8a56d1599eaa9fb00afd

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks