General

  • Target

    NEW ORDERS.exe

  • Size

    587KB

  • Sample

    201217-83xa51lbj2

  • MD5

    25db6bf1906d3f8e82f2e0be5c84cce5

  • SHA1

    b25465a07d80934f44c4f94c87848c19aeaa4dec

  • SHA256

    21b720127c08d4ba7b5fe44f6c1f555db9b2b98a3adc53b9f63a2fe63e6e5ead

  • SHA512

    6edb791a243b845d6dcd6226207a6a5196e01a9cd21c6d3bd6c6c03ba263ae077a18c62d7935a01ac764621fa107a9c5aefb376f2f35c05d86134b5dab0c62ad

Malware Config

Targets

    • Target

      NEW ORDERS.exe

    • Size

      587KB

    • MD5

      25db6bf1906d3f8e82f2e0be5c84cce5

    • SHA1

      b25465a07d80934f44c4f94c87848c19aeaa4dec

    • SHA256

      21b720127c08d4ba7b5fe44f6c1f555db9b2b98a3adc53b9f63a2fe63e6e5ead

    • SHA512

      6edb791a243b845d6dcd6226207a6a5196e01a9cd21c6d3bd6c6c03ba263ae077a18c62d7935a01ac764621fa107a9c5aefb376f2f35c05d86134b5dab0c62ad

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks