General

  • Target

    50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301

  • Size

    182KB

  • Sample

    220718-yzgyesggbm

  • MD5

    67e4fd83de43eaf93e7c9faf77c36f78

  • SHA1

    bbeddca7949e44d92a6207a31a29f41cca462ba0

  • SHA256

    50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301

  • SHA512

    42684195a35b81fb1b4f6d8266a9568c768b3c0c64ef660cf9807bff2d0c853ab8755e7f7e79135c67ebb37c253e9e104218de97e86431d380ff1321d497ce62

Malware Config

Extracted

Family

netwire

C2

fingers1.ddns.net:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301

    • Size

      182KB

    • MD5

      67e4fd83de43eaf93e7c9faf77c36f78

    • SHA1

      bbeddca7949e44d92a6207a31a29f41cca462ba0

    • SHA256

      50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301

    • SHA512

      42684195a35b81fb1b4f6d8266a9568c768b3c0c64ef660cf9807bff2d0c853ab8755e7f7e79135c67ebb37c253e9e104218de97e86431d380ff1321d497ce62

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks