General

  • Target

    3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4

  • Size

    226KB

  • Sample

    220630-ycz6gscad2

  • MD5

    aaba0aeb767328afc2bbb76bfbb19297

  • SHA1

    8ba930891e1c8834303ebbdf2261703f5050e9f7

  • SHA256

    3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4

  • SHA512

    b5f3395cdacdf6c4b42976c016711fa162ccf56f86f1402d1b7c82d011297e99824208b4d6bf96eeda82b864542c4e2c0a93a684fdab43b85656a39b2f0d4390

Malware Config

Extracted

Family

netwire

C2

genlast.giize.com:1604

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4

    • Size

      226KB

    • MD5

      aaba0aeb767328afc2bbb76bfbb19297

    • SHA1

      8ba930891e1c8834303ebbdf2261703f5050e9f7

    • SHA256

      3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4

    • SHA512

      b5f3395cdacdf6c4b42976c016711fa162ccf56f86f1402d1b7c82d011297e99824208b4d6bf96eeda82b864542c4e2c0a93a684fdab43b85656a39b2f0d4390

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks