General

  • Target

    sstw5VHmkS2cGiF.exe

  • Size

    973KB

  • Sample

    220629-gzcj9sghh2

  • MD5

    89e0f3ba3b0356030882a5d993c44a96

  • SHA1

    5aa37d9479803a1fa692974323849d1eaad34328

  • SHA256

    4a762e8f8af34dcfcd469d9e9bfb43c977cd878d939527053a46dd580e654c80

  • SHA512

    aced63ee766f6c64c795653a889fa11c70f4c227c77c6cd432825837465b7ddb056856f87ea93c79e511f8c65d7dabda7bf47ad881265c556edde9cd22408e0b

Malware Config

Extracted

Family

netwire

C2

20220627.duckdns.org:4736

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • mutex

    KmOVkegF

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      sstw5VHmkS2cGiF.exe

    • Size

      973KB

    • MD5

      89e0f3ba3b0356030882a5d993c44a96

    • SHA1

      5aa37d9479803a1fa692974323849d1eaad34328

    • SHA256

      4a762e8f8af34dcfcd469d9e9bfb43c977cd878d939527053a46dd580e654c80

    • SHA512

      aced63ee766f6c64c795653a889fa11c70f4c227c77c6cd432825837465b7ddb056856f87ea93c79e511f8c65d7dabda7bf47ad881265c556edde9cd22408e0b

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks