General

  • Target

    61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22

  • Size

    417KB

  • Sample

    220724-ybv55sdgg8

  • MD5

    71d59047c2e6db46bd7886acf1ef1f8d

  • SHA1

    286fdb9a2c160a26ba3f8437d7b4d23dff605496

  • SHA256

    61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22

  • SHA512

    1fe94be986c509c8a754c0ba8011f4adb1d50ac87f0d843d8f145341b31b74170ae38f2d7242bfec996d967ef2852196f2ec0dd3d183face8ecf7f6242ad1958

Malware Config

Extracted

Family

netwire

C2

fingers1.ddns.net:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22

    • Size

      417KB

    • MD5

      71d59047c2e6db46bd7886acf1ef1f8d

    • SHA1

      286fdb9a2c160a26ba3f8437d7b4d23dff605496

    • SHA256

      61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22

    • SHA512

      1fe94be986c509c8a754c0ba8011f4adb1d50ac87f0d843d8f145341b31b74170ae38f2d7242bfec996d967ef2852196f2ec0dd3d183face8ecf7f6242ad1958

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks