General

  • Target

    47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca

  • Size

    790KB

  • Sample

    220625-nexg9saagk

  • MD5

    83cb754727db76ae43478657504a9919

  • SHA1

    338cff0ee0001a48ced70ca80f5985c33cef1312

  • SHA256

    47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca

  • SHA512

    710936a25692f192f7a5ef76e791049fce45887535fe931ae8a730ea96e79d2beba5f3b4bef83e2a424a079eab2a7ea217e129c689a8e9202a6ff670241c2844

Malware Config

Extracted

Family

netwire

C2

185.140.53.61:39469

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    MMC

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Logs\Imgburn\

  • lock_executable

    false

  • mutex

    BdYNVjOs

  • offline_keylogger

    true

  • password

    Favor1000$

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca

    • Size

      790KB

    • MD5

      83cb754727db76ae43478657504a9919

    • SHA1

      338cff0ee0001a48ced70ca80f5985c33cef1312

    • SHA256

      47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca

    • SHA512

      710936a25692f192f7a5ef76e791049fce45887535fe931ae8a730ea96e79d2beba5f3b4bef83e2a424a079eab2a7ea217e129c689a8e9202a6ff670241c2844

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks