General

  • Target

    876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6

  • Size

    1.3MB

  • Sample

    220725-dqvspscegn

  • MD5

    9f87dadf4d0571f3e441c9d5911864c8

  • SHA1

    832dfa671b4be3085e997ffd46e0bc243f1f74b8

  • SHA256

    876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6

  • SHA512

    02750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580

Malware Config

Extracted

Family

netwire

C2

185.244.30.254:3361

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6

    • Size

      1.3MB

    • MD5

      9f87dadf4d0571f3e441c9d5911864c8

    • SHA1

      832dfa671b4be3085e997ffd46e0bc243f1f74b8

    • SHA256

      876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6

    • SHA512

      02750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks