General

  • Target

    57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

  • Size

    196KB

  • Sample

    220724-yfg43seccq

  • MD5

    40af2d46b77bcdc84924c5b6a29bfe2d

  • SHA1

    8ff1371ddd1fc3839c06d4cc1f86166873a6c726

  • SHA256

    57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

  • SHA512

    860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

Malware Config

Targets

    • Target

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

    • Size

      196KB

    • MD5

      40af2d46b77bcdc84924c5b6a29bfe2d

    • SHA1

      8ff1371ddd1fc3839c06d4cc1f86166873a6c726

    • SHA256

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

    • SHA512

      860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks