General

  • Target

    b2474f4fff2fe8de9b91642837364f75

  • Size

    394KB

  • Sample

    201117-rbwgb9efbj

  • MD5

    b2474f4fff2fe8de9b91642837364f75

  • SHA1

    4c502f32d0d29750b4a821944af6861722428b0d

  • SHA256

    0e950de0479f62a50178a15909a1ee421345b0ad6cfda87ef9bb453afad71b54

  • SHA512

    6180fde282e396c9011630cd060272df19cc3b532b8f55389da83dda0df41f1e473c1097844709a8fe1d7f4caa6c4d990dc2555907556b67c8cf96d26fe3a5c4

Malware Config

Targets

    • Target

      b2474f4fff2fe8de9b91642837364f75

    • Size

      394KB

    • MD5

      b2474f4fff2fe8de9b91642837364f75

    • SHA1

      4c502f32d0d29750b4a821944af6861722428b0d

    • SHA256

      0e950de0479f62a50178a15909a1ee421345b0ad6cfda87ef9bb453afad71b54

    • SHA512

      6180fde282e396c9011630cd060272df19cc3b532b8f55389da83dda0df41f1e473c1097844709a8fe1d7f4caa6c4d990dc2555907556b67c8cf96d26fe3a5c4

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks