General

  • Target

    3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

  • Size

    192KB

  • Sample

    220703-tvb46aaea7

  • MD5

    156e82b43c311a45552a5a6f44247804

  • SHA1

    108b1578ee10e7e531b6cd0bda86e545114b286a

  • SHA256

    3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

  • SHA512

    f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

Malware Config

Targets

    • Target

      3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

    • Size

      192KB

    • MD5

      156e82b43c311a45552a5a6f44247804

    • SHA1

      108b1578ee10e7e531b6cd0bda86e545114b286a

    • SHA256

      3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

    • SHA512

      f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks