General

  • Target

    362ade4173906284e7a589487ef006ceaff1432d4defb33f83c6e6f0bd3cb09a

  • Size

    265KB

  • Sample

    220626-dys9vafbhq

  • MD5

    92878813dcf29561ac35fb37820839f5

  • SHA1

    377128b7a144234b4f103c241c6bb599d79b877e

  • SHA256

    362ade4173906284e7a589487ef006ceaff1432d4defb33f83c6e6f0bd3cb09a

  • SHA512

    9f7410d93185de83761413a1c8c01d91d9120ba0c0afa1c5701338c0a0a5e379821de9fb2e7e77bca699dcc384af026857776958368f4327d87a501ebaee5a36

Malware Config

Extracted

Family

netwire

C2

wealthyjamesbond.ddns.net:39560

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    sunshineslisa

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Logs\Imgburn\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    sucess

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      362ade4173906284e7a589487ef006ceaff1432d4defb33f83c6e6f0bd3cb09a

    • Size

      265KB

    • MD5

      92878813dcf29561ac35fb37820839f5

    • SHA1

      377128b7a144234b4f103c241c6bb599d79b877e

    • SHA256

      362ade4173906284e7a589487ef006ceaff1432d4defb33f83c6e6f0bd3cb09a

    • SHA512

      9f7410d93185de83761413a1c8c01d91d9120ba0c0afa1c5701338c0a0a5e379821de9fb2e7e77bca699dcc384af026857776958368f4327d87a501ebaee5a36

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks