General

  • Target

    5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab

  • Size

    989KB

  • Sample

    220724-ft7yjsgbfk

  • MD5

    09f7912493d7b995e0d765387b8ce2a1

  • SHA1

    0bcf195f1a77e3d02c67b532780796fb1a37d25f

  • SHA256

    5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab

  • SHA512

    97cd60f9afca58ccd0b52d54ac9b0f4ea8f7c2d03a500ee16df7e1d3ce1a1c4fca13ee5e919e4787c44729a4bff45a28f9831e07259649064e77de889be1dba1

Malware Config

Extracted

Family

netwire

C2

91.192.100.25:3369

Attributes
  • activex_autorun

    true

  • activex_key

    {3757GA31-8R2X-4686-5K7C-I4FIR5682QEX}

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    false

Targets

    • Target

      5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab

    • Size

      989KB

    • MD5

      09f7912493d7b995e0d765387b8ce2a1

    • SHA1

      0bcf195f1a77e3d02c67b532780796fb1a37d25f

    • SHA256

      5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab

    • SHA512

      97cd60f9afca58ccd0b52d54ac9b0f4ea8f7c2d03a500ee16df7e1d3ce1a1c4fca13ee5e919e4787c44729a4bff45a28f9831e07259649064e77de889be1dba1

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks