PO-13916.jpeg.exe

General
Target

PO-13916.jpeg.exe

Size

23KB

Sample

210713-tjxmsmh53j

Score
10 /10
MD5

43132b52987daa1e94acd4fba098cc55

SHA1

8080d8db03455a2b82fadb74c15d573e7519390a

SHA256

289b1b674ae1d8ebd1693294b8f14560195fa8948c61b21478fa75aaa3d76301

SHA512

5e544b288d309e98b8e2e3dc8316e0ec0c09f96cfa4ca76a8d163ef3f846dcd6748c6f1f569303a363c715725987dac1b5993f8ba8212d06b2cefd9ad34efcff

Malware Config

Extracted

Family netwire
C2

netwire.linkpc.net:6000

Attributes
activex_autorun
false
activex_key
copy_executable
false
delete_original
false
host_id
NETWIRE 2021
install_path
keylogger_dir
%AppData%\Logs\
lock_executable
false
mutex
PXVtYqoX
offline_keylogger
true
password
chizzy25@
registry_autorun
false
startup_name
use_mutex
true
Targets
Target

PO-13916.jpeg.exe

MD5

43132b52987daa1e94acd4fba098cc55

Filesize

23KB

Score
10 /10
SHA1

8080d8db03455a2b82fadb74c15d573e7519390a

SHA256

289b1b674ae1d8ebd1693294b8f14560195fa8948c61b21478fa75aaa3d76301

SHA512

5e544b288d309e98b8e2e3dc8316e0ec0c09f96cfa4ca76a8d163ef3f846dcd6748c6f1f569303a363c715725987dac1b5993f8ba8212d06b2cefd9ad34efcff

Tags

Signatures

  • NetWire RAT payload

    Tags

  • Netwire

    Description

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    Tags

  • Windows security bypass

    Tags

    TTPs

    Disabling Security Tools Modify Registry
  • Windows security modification

    Tags

    TTPs

    Disabling Security Tools Modify Registry
  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup Folder Modify Registry
  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Privilege Escalation