General

  • Target

    Quote.xll

  • Size

    3.5MB

  • Sample

    220720-xd2v2afbf6

  • MD5

    a8e4d303989a278e632723fa6862d17c

  • SHA1

    4f2e12a680fb2085ee688eedf12a28dc37276f70

  • SHA256

    4d56278b029bdc00e31be2e1c2fbc5466e5922021339f76d9cd85627d2cbbe4d

  • SHA512

    84d69b24e644409578392bb68a109a863820ddf6915efae1e82e686203c2dd6fd9e390589f6f6e500d17bc2528f2425a8d803db2b5dbe43aadd03c4b8e65679e

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

netwire

C2

194.5.98.126:3378

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Pass@2023

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      Quote.xll

    • Size

      3.5MB

    • MD5

      a8e4d303989a278e632723fa6862d17c

    • SHA1

      4f2e12a680fb2085ee688eedf12a28dc37276f70

    • SHA256

      4d56278b029bdc00e31be2e1c2fbc5466e5922021339f76d9cd85627d2cbbe4d

    • SHA512

      84d69b24e644409578392bb68a109a863820ddf6915efae1e82e686203c2dd6fd9e390589f6f6e500d17bc2528f2425a8d803db2b5dbe43aadd03c4b8e65679e

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks