General

  • Target

    bebee16eea9946fb65b2c3eae3d03c155123ab890f98d733440561250ba8604d

  • Size

    397KB

  • Sample

    220521-bpmplafccj

  • MD5

    0eb0f415368167b48d7e8763b3fa29dc

  • SHA1

    56258ad24b8604cc918579254f0f4ae911250bdd

  • SHA256

    bebee16eea9946fb65b2c3eae3d03c155123ab890f98d733440561250ba8604d

  • SHA512

    5ce2a6f7e67119956e335a06eaae7436b22e9f63b22e0bcd921554759cf1440bfdb5cf7cba377e153761b43afd3c269c956e5ecddd63cf9c7b332587004009f1

Malware Config

Extracted

Family

netwire

C2

38.132.124.156:1199

Attributes
  • activex_autorun

    false

  • activex_key

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

  • offline_keylogger

    true

  • password

    12345

  • registry_autorun

    true

  • startup_name

    ronies

  • use_mutex

    false

Targets

    • Target

      CPA accountant COVID_19 pandemic relief (20,000$).exe

    • Size

      584KB

    • MD5

      1918fa86b99fda35462ec060e9c419bb

    • SHA1

      3d393d15044bd193851297bdc94c38f44a6e1fd2

    • SHA256

      a34bd4c266e3891796816854e78d62384dcf36a8f456476e69d0dacf109d1737

    • SHA512

      b6cae10db3ecd2bebb5b017c7a09f46ef5a6f9a84747419d0b041b4b6b6769b43e4e4df2454d38c15b58f3a4e10f9d60eb416a1ef3383f32f8d62fd6a09dc15e

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks