General

  • Target

    461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51

  • Size

    696KB

  • Sample

    220707-lsr4labfdr

  • MD5

    399875e9d324075be8e0bdc9c40db26f

  • SHA1

    9444dbe54f9965a47c754853a28ad5ef1ee542ae

  • SHA256

    461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51

  • SHA512

    68f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7

Malware Config

Targets

    • Target

      461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51

    • Size

      696KB

    • MD5

      399875e9d324075be8e0bdc9c40db26f

    • SHA1

      9444dbe54f9965a47c754853a28ad5ef1ee542ae

    • SHA256

      461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51

    • SHA512

      68f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks