General

  • Target

    38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

  • Size

    351KB

  • Sample

    220625-yxm2naceb3

  • MD5

    c6880d3f845a57d080145d53a6ac58e3

  • SHA1

    cca382986b9969b6b2e4210655f5e71b001964bf

  • SHA256

    38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

  • SHA512

    d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec

Malware Config

Extracted

Family

netwire

C2

ASKJHDASKDHSHTD.RU:6971

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • mutex

    mqIhDWwE

  • offline_keylogger

    false

  • password

    ppF7"oRyqm

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

    • Size

      351KB

    • MD5

      c6880d3f845a57d080145d53a6ac58e3

    • SHA1

      cca382986b9969b6b2e4210655f5e71b001964bf

    • SHA256

      38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

    • SHA512

      d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks