General

  • Target

    572b8dda06a7d8a8f707579749f32d6ee927583bb7944dc41fd306d7aa2093c0

  • Size

    840KB

  • Sample

    220725-atcvhsfbf6

  • MD5

    74e8a23be621a133b9591d9001903dea

  • SHA1

    06f05f42976b1c9fd6fc3cf9fb69397954713009

  • SHA256

    572b8dda06a7d8a8f707579749f32d6ee927583bb7944dc41fd306d7aa2093c0

  • SHA512

    124d219abd673a94bef0c3c06628b6dba39e0429296b2ae7af4d9920b32ae88654cf577245747f0ed25aefd30fabcb056ac668bccb4aad2fa941c46e08fea470

Malware Config

Extracted

Family

netwire

C2

93.87.38.24:3369

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Serbia123

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      572b8dda06a7d8a8f707579749f32d6ee927583bb7944dc41fd306d7aa2093c0

    • Size

      840KB

    • MD5

      74e8a23be621a133b9591d9001903dea

    • SHA1

      06f05f42976b1c9fd6fc3cf9fb69397954713009

    • SHA256

      572b8dda06a7d8a8f707579749f32d6ee927583bb7944dc41fd306d7aa2093c0

    • SHA512

      124d219abd673a94bef0c3c06628b6dba39e0429296b2ae7af4d9920b32ae88654cf577245747f0ed25aefd30fabcb056ac668bccb4aad2fa941c46e08fea470

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks