General

  • Target

    cfd3ac39a13d75256a5677f6745aa4e0660fd073e98b44102f4214b9d741d4bb

  • Size

    509KB

  • Sample

    220724-zpewragbeq

  • MD5

    e332d13c5d681efc1decca9fdf483cb5

  • SHA1

    1369bc391e7e07205f99a41486856bbc8f933967

  • SHA256

    cfd3ac39a13d75256a5677f6745aa4e0660fd073e98b44102f4214b9d741d4bb

  • SHA512

    41804863aff4605e76747c983f27be1f78f430eff551e7a036b4f2711fede40ff516aa61aaf392a0070fb475aa311b506ce4892cea6adcb43b041c23bfabfb9d

Malware Config

Targets

    • Target

      cfd3ac39a13d75256a5677f6745aa4e0660fd073e98b44102f4214b9d741d4bb

    • Size

      509KB

    • MD5

      e332d13c5d681efc1decca9fdf483cb5

    • SHA1

      1369bc391e7e07205f99a41486856bbc8f933967

    • SHA256

      cfd3ac39a13d75256a5677f6745aa4e0660fd073e98b44102f4214b9d741d4bb

    • SHA512

      41804863aff4605e76747c983f27be1f78f430eff551e7a036b4f2711fede40ff516aa61aaf392a0070fb475aa311b506ce4892cea6adcb43b041c23bfabfb9d

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks