General

  • Target

    4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e

  • Size

    475KB

  • Sample

    220707-l37l2aecc2

  • MD5

    25e0f7ac790860ce8d5ddd8977b8f900

  • SHA1

    1d4e1fd67dfce63b7b7f246fbd976802e15cd205

  • SHA256

    4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e

  • SHA512

    1064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471

Malware Config

Targets

    • Target

      4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e

    • Size

      475KB

    • MD5

      25e0f7ac790860ce8d5ddd8977b8f900

    • SHA1

      1d4e1fd67dfce63b7b7f246fbd976802e15cd205

    • SHA256

      4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e

    • SHA512

      1064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks