General

  • Target

    3b5cd4856df683d72eed757e2909127f954583ef95e8fbc614744c4cab0bdd5c

  • Size

    764KB

  • Sample

    220703-t7g6yabac6

  • MD5

    ae84dea629f781b3b3539436c02f398b

  • SHA1

    914520644cbb9c7cebc856064f7bc136b96ed380

  • SHA256

    3b5cd4856df683d72eed757e2909127f954583ef95e8fbc614744c4cab0bdd5c

  • SHA512

    a05b88eb78ad67054675d49e50b9bdd6a41a03b817f6fec3f1ed64e7c28393c4d87b72d3578c5d3a9f6a5c0d7ee793a39e112e9054ddf42ff4b0d8e08fa69229

Malware Config

Targets

    • Target

      3b5cd4856df683d72eed757e2909127f954583ef95e8fbc614744c4cab0bdd5c

    • Size

      764KB

    • MD5

      ae84dea629f781b3b3539436c02f398b

    • SHA1

      914520644cbb9c7cebc856064f7bc136b96ed380

    • SHA256

      3b5cd4856df683d72eed757e2909127f954583ef95e8fbc614744c4cab0bdd5c

    • SHA512

      a05b88eb78ad67054675d49e50b9bdd6a41a03b817f6fec3f1ed64e7c28393c4d87b72d3578c5d3a9f6a5c0d7ee793a39e112e9054ddf42ff4b0d8e08fa69229

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks