General

  • Target

    2890e54b5f92a93286f1df01d7e2ea4e866637174e503914da848d69bc5cf1b9

  • Size

    494KB

  • Sample

    220701-h7ng6shffq

  • MD5

    bba1a9dc9bb16a9166b4ad9af4f63b09

  • SHA1

    515db743808b361180ff05ec79903c407f4c9081

  • SHA256

    2890e54b5f92a93286f1df01d7e2ea4e866637174e503914da848d69bc5cf1b9

  • SHA512

    d4487f60948630461def9fa07d1d2d2a2e88b4b4746c8523a943fb69366bc7778e10111d0bf501f29d921a3bea60bb6e0d61d44fa3a9836e85741275cfcff092

Malware Config

Extracted

Family

netwire

C2

imglb.zapto.org:5934

bossback.camdvr.org:5934

Attributes
  • activex_autorun

    true

  • activex_key

    {8BD2JQU1-VOGH-J424-23XH-7A3M71HN7320}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    NEW

  • install_path

    %AppData%\Install\chromes.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    BBtuYXdo

  • offline_keylogger

    true

  • password

    Hunter45

  • registry_autorun

    true

  • startup_name

    Opera

  • use_mutex

    true

Targets

    • Target

      2890e54b5f92a93286f1df01d7e2ea4e866637174e503914da848d69bc5cf1b9

    • Size

      494KB

    • MD5

      bba1a9dc9bb16a9166b4ad9af4f63b09

    • SHA1

      515db743808b361180ff05ec79903c407f4c9081

    • SHA256

      2890e54b5f92a93286f1df01d7e2ea4e866637174e503914da848d69bc5cf1b9

    • SHA512

      d4487f60948630461def9fa07d1d2d2a2e88b4b4746c8523a943fb69366bc7778e10111d0bf501f29d921a3bea60bb6e0d61d44fa3a9836e85741275cfcff092

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks