General

  • Target

    5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326

  • Size

    1002KB

  • Sample

    220724-cd2vtaahak

  • MD5

    69da18e4bcdad84f3233a2953f7aaf98

  • SHA1

    7a7b87d3dcede30f192e3929b0412a89c9da58ee

  • SHA256

    5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326

  • SHA512

    d995c316f9513a0998e8154077bc01859cc271fb9aa3f1493714da0cd1d776ac645c9eca6dc1511ef1093031fc9fa07025064d49ebc4d99c9f4cbe69fbb32f29

Malware Config

Extracted

Family

netwire

C2

systool.sytes.net:4007

uploadp3p.publicvm.com:4007

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    NeWYeaR-%Rand%

  • install_path

    %AppData%\System32\svhosts.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    LCNLrCMr

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326

    • Size

      1002KB

    • MD5

      69da18e4bcdad84f3233a2953f7aaf98

    • SHA1

      7a7b87d3dcede30f192e3929b0412a89c9da58ee

    • SHA256

      5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326

    • SHA512

      d995c316f9513a0998e8154077bc01859cc271fb9aa3f1493714da0cd1d776ac645c9eca6dc1511ef1093031fc9fa07025064d49ebc4d99c9f4cbe69fbb32f29

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Drops startup file

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks