General

  • Target

    7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1

  • Size

    1.2MB

  • Sample

    220708-r9ht5sghd4

  • MD5

    f22c7168d2c41964a1dfbf99904a2843

  • SHA1

    274337d271c26d63c9d36cd89a53456941d6f1df

  • SHA256

    7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1

  • SHA512

    8110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb

Malware Config

Extracted

Family

netwire

C2

95.167.151.235:8973

Attributes
  • activex_autorun

    true

  • activex_key

    {N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    true

  • startup_name

    windows

  • use_mutex

    false

Targets

    • Target

      7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1

    • Size

      1.2MB

    • MD5

      f22c7168d2c41964a1dfbf99904a2843

    • SHA1

      274337d271c26d63c9d36cd89a53456941d6f1df

    • SHA256

      7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1

    • SHA512

      8110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Drops startup file

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks