General
-
Target
aba0f23ae3b752463217cbe7b2a9fe5657c88efb740bb42bedd8acb1ddc1028f
-
Size
3.9MB
-
Sample
220521-n76xeahhhp
-
MD5
4df0f5f47b53a43078dfeedb91c833df
-
SHA1
547348b035e08412e3966ad3d0f8e4ea861d7a1e
-
SHA256
aba0f23ae3b752463217cbe7b2a9fe5657c88efb740bb42bedd8acb1ddc1028f
-
SHA512
51b1bcd87e54aef4e0fc0d5a901068f22d5d3b7039d26f5345f0465f60972e62ba860427047da5f22d6ba0998d8c1daa39d416bf17bceb74985a8207f6282162
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT_.scr
Resource
win7-20220414-en
Malware Config
Extracted
netwire
alkaline.publicvm.com:1777
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
home198
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
EEwpRdkL
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
- startup_name
-
use_mutex
true
Targets
-
-
Target
PAYMENT_.SCR
-
Size
3.3MB
-
MD5
e379f065a86da6a2a18d295e6c761567
-
SHA1
70c1118d216adb364d1779f429bb74f62b02e625
-
SHA256
43ff3fea39b1e9ca2ebc2f714057bb50d14b4c76d46e31ee58ada74ded595eed
-
SHA512
419e75c799d8b94b28b789573ab15b44c970470e0a0046dd1d5fa28b7529b6dac5f48676b355070fbcaed5c32af0f8c6f1d31f48ad00cc849a88fe8b4ad56a0c
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Winlogon Helper DLL
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
4Disabling Security Tools
2Virtualization/Sandbox Evasion
2