General

  • Target

    452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b

  • Size

    632KB

  • Sample

    220707-vjzxhsbggj

  • MD5

    103103bcf0df850da224b5ec97ef91e9

  • SHA1

    cf9a21010fc1bc58da283626e85c2e375d37483c

  • SHA256

    452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b

  • SHA512

    d2f34f4debb92b176b581e31b420cf7e0478db3ca6fe47b48fa80213c849d574afca4f16d7598bdd057d04bfc453e4aeb694c2023c8377b295985f439774df6a

Malware Config

Extracted

Family

netwire

C2

xmpphosts.ru:3367

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • mutex

    oOdvssQB

  • offline_keylogger

    false

  • password

    456123xyz

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b

    • Size

      632KB

    • MD5

      103103bcf0df850da224b5ec97ef91e9

    • SHA1

      cf9a21010fc1bc58da283626e85c2e375d37483c

    • SHA256

      452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b

    • SHA512

      d2f34f4debb92b176b581e31b420cf7e0478db3ca6fe47b48fa80213c849d574afca4f16d7598bdd057d04bfc453e4aeb694c2023c8377b295985f439774df6a

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks