General

  • Target

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

  • Size

    656KB

  • Sample

    220708-ew13cabbg7

  • MD5

    714bcb747c559e227f47ea71a05fb52e

  • SHA1

    f8b07712e284cd4c00c555ee07482be321749a0a

  • SHA256

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

  • SHA512

    ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569

Malware Config

Targets

    • Target

      41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

    • Size

      656KB

    • MD5

      714bcb747c559e227f47ea71a05fb52e

    • SHA1

      f8b07712e284cd4c00c555ee07482be321749a0a

    • SHA256

      41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

    • SHA512

      ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks