General

  • Target

    587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f

  • Size

    558KB

  • Sample

    220724-rpm85afedn

  • MD5

    f131435dead0e37aee759622ababb51f

  • SHA1

    3fb5bd52e8dc3bbc0a072ceda02255e8f9f4ea70

  • SHA256

    587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f

  • SHA512

    a16240153654064a65c32d17f9b8e6cb75924f37547b93b47a489aaa48a69a8c442947d1f559d1b9efc51a909f96f8e23a93f1bee721e6b2e7180dfcd938552f

Malware Config

Extracted

Family

netwire

C2

173.46.85.16:89

Attributes
  • activex_autorun

    true

  • activex_key

    {J418T26D-3X70-W6QE-W00F-G37EOA6W8D23}

  • copy_executable

    false

  • delete_original

    true

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    fbbTJkoP

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Targets

    • Target

      587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f

    • Size

      558KB

    • MD5

      f131435dead0e37aee759622ababb51f

    • SHA1

      3fb5bd52e8dc3bbc0a072ceda02255e8f9f4ea70

    • SHA256

      587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f

    • SHA512

      a16240153654064a65c32d17f9b8e6cb75924f37547b93b47a489aaa48a69a8c442947d1f559d1b9efc51a909f96f8e23a93f1bee721e6b2e7180dfcd938552f

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Modifies Installed Components in the registry

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks