General

  • Target

    67ef63e5a825981d5df3913386c1d1e65d57097f03da162b7a5bd4f355cf8c2b

  • Size

    805KB

  • Sample

    220725-d4q2nsdab6

  • MD5

    646ed17ed05a8e0925c95e4b43210e2c

  • SHA1

    ca333c718dad8faff0d6e99ba33b7c336d8b82db

  • SHA256

    67ef63e5a825981d5df3913386c1d1e65d57097f03da162b7a5bd4f355cf8c2b

  • SHA512

    6d63c2f96db0ca0cd97d6563cbc85099c090d165153c32794f6b7b86d966b2086af3192b1508d1b5342ced3f325856e36bfb76930cb93f372c7220b7632a30f7

Malware Config

Targets

    • Target

      67ef63e5a825981d5df3913386c1d1e65d57097f03da162b7a5bd4f355cf8c2b

    • Size

      805KB

    • MD5

      646ed17ed05a8e0925c95e4b43210e2c

    • SHA1

      ca333c718dad8faff0d6e99ba33b7c336d8b82db

    • SHA256

      67ef63e5a825981d5df3913386c1d1e65d57097f03da162b7a5bd4f355cf8c2b

    • SHA512

      6d63c2f96db0ca0cd97d6563cbc85099c090d165153c32794f6b7b86d966b2086af3192b1508d1b5342ced3f325856e36bfb76930cb93f372c7220b7632a30f7

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks