General

  • Target

    aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a

  • Size

    1.1MB

  • Sample

    220701-hd8w1sgbgl

  • MD5

    af7f49ce2086c5254186387d64df2347

  • SHA1

    1fe82d6f4184d79e425be3eab340caa6950af4ed

  • SHA256

    aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a

  • SHA512

    1020846174c9323c7944effd2465026923dc4fa529d70e34628a5d80a95e3978a562981e92e7d604b3bf67a28f7042002f123fb31ae3e32e9abb92fef0c2d578

Malware Config

Extracted

Family

netwire

C2

79.134.225.73:1968

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    pd1n9

  • lock_executable

    false

  • mutex

    KHAtGUwc

  • offline_keylogger

    false

  • password

    Kimbolsapoq!P13

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a

    • Size

      1.1MB

    • MD5

      af7f49ce2086c5254186387d64df2347

    • SHA1

      1fe82d6f4184d79e425be3eab340caa6950af4ed

    • SHA256

      aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a

    • SHA512

      1020846174c9323c7944effd2465026923dc4fa529d70e34628a5d80a95e3978a562981e92e7d604b3bf67a28f7042002f123fb31ae3e32e9abb92fef0c2d578

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks