General

  • Target

    4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5

  • Size

    653KB

  • Sample

    220712-nbs1nsffcm

  • MD5

    14bd022f8d3015ed27072197d179f676

  • SHA1

    7cd38a3b9987c7f4e9aff01963f681cde346b8a6

  • SHA256

    4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5

  • SHA512

    f05a3d8b5d47b5f590822dc0beb9ad6b4830862eb10cb9eaa4c5d1405409e2ffa3fd4f4ebf6ba46ceb87ef18bf002463613246f6eb60de62c983f0b4e03223b0

Malware Config

Extracted

Family

netwire

C2

185.247.228.18:1968

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    n5de2

  • lock_executable

    false

  • mutex

    QixvinGV

  • offline_keylogger

    false

  • password

    Kimbolsapoq!P13

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5

    • Size

      653KB

    • MD5

      14bd022f8d3015ed27072197d179f676

    • SHA1

      7cd38a3b9987c7f4e9aff01963f681cde346b8a6

    • SHA256

      4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5

    • SHA512

      f05a3d8b5d47b5f590822dc0beb9ad6b4830862eb10cb9eaa4c5d1405409e2ffa3fd4f4ebf6ba46ceb87ef18bf002463613246f6eb60de62c983f0b4e03223b0

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks