General

  • Target

    cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72

  • Size

    521KB

  • Sample

    220725-dkbgwacae8

  • MD5

    c784ee0059d15987a9a306e322e0d062

  • SHA1

    cf78fdd65e08005131e4ef42912fc8e07d685fa0

  • SHA256

    cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72

  • SHA512

    6a85028af5becb599a130c3947a2f17d24672b35a676d7397efd9072df7cfe33fe4a3ccb8544e6f671524add7697100546bec351c357017f69f2ee74019b1463

Malware Config

Extracted

Family

netwire

C2

185.171.25.3:1406

Attributes
  • activex_autorun

    true

  • activex_key

    {IXXTPY86-B7O0-U8M5-0OD1-4Y2C8828J3G0}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    bubu

  • install_path

    %AppData%\Install\Host.exe

  • lock_executable

    false

  • mutex

    tvNRDcbc

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Targets

    • Target

      cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72

    • Size

      521KB

    • MD5

      c784ee0059d15987a9a306e322e0d062

    • SHA1

      cf78fdd65e08005131e4ef42912fc8e07d685fa0

    • SHA256

      cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72

    • SHA512

      6a85028af5becb599a130c3947a2f17d24672b35a676d7397efd9072df7cfe33fe4a3ccb8544e6f671524add7697100546bec351c357017f69f2ee74019b1463

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks