General

  • Target

    c4f29fb97348c8d3408d01a3e2362d6840135885fa126c545949dcc9f38ef13f

  • Size

    155KB

  • Sample

    220724-z7a1hshacr

  • MD5

    1dd6c0990e4c3b2d3e22e1641379a325

  • SHA1

    f92b9d921819f3314a006306402567c186b3a897

  • SHA256

    c4f29fb97348c8d3408d01a3e2362d6840135885fa126c545949dcc9f38ef13f

  • SHA512

    a4a76065f5391886216cacc2bc481b4a5cba33530ad00fc0af311831b90c4177397414c6655c833c9bfb62fdde13ec961e397721b2629b6f45c21598f0907ac5

Malware Config

Targets

    • Target

      c4f29fb97348c8d3408d01a3e2362d6840135885fa126c545949dcc9f38ef13f

    • Size

      155KB

    • MD5

      1dd6c0990e4c3b2d3e22e1641379a325

    • SHA1

      f92b9d921819f3314a006306402567c186b3a897

    • SHA256

      c4f29fb97348c8d3408d01a3e2362d6840135885fa126c545949dcc9f38ef13f

    • SHA512

      a4a76065f5391886216cacc2bc481b4a5cba33530ad00fc0af311831b90c4177397414c6655c833c9bfb62fdde13ec961e397721b2629b6f45c21598f0907ac5

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks