General

  • Target

    INv002388923899.exe

  • Size

    1.0MB

  • Sample

    220708-hrgppagcb9

  • MD5

    30ebcb3b124b6573e05d8d9b3c350ed6

  • SHA1

    13068f645d753ce1d9c95fc61687153f58dd8335

  • SHA256

    c0c9635c211e0910cf5225da838e4293b50ff69cbb6cc6f8ac78da64e88586ec

  • SHA512

    cdfc5c802757d8e23a18cd53e6d3dc0b76039540032f314a4fc6bcf3eeabce490ef0a251ca87219c22c475b6a84663f71b65027707f4b923c1a6c86aeb19a2c5

Malware Config

Extracted

Family

netwire

C2

xman2.duckdns.org:4433

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      INv002388923899.exe

    • Size

      1.0MB

    • MD5

      30ebcb3b124b6573e05d8d9b3c350ed6

    • SHA1

      13068f645d753ce1d9c95fc61687153f58dd8335

    • SHA256

      c0c9635c211e0910cf5225da838e4293b50ff69cbb6cc6f8ac78da64e88586ec

    • SHA512

      cdfc5c802757d8e23a18cd53e6d3dc0b76039540032f314a4fc6bcf3eeabce490ef0a251ca87219c22c475b6a84663f71b65027707f4b923c1a6c86aeb19a2c5

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks