General

  • Target

    184237dfdea7399428139bbf06ecec05.exe

  • Size

    915KB

  • Sample

    220725-lfbwvabhem

  • MD5

    184237dfdea7399428139bbf06ecec05

  • SHA1

    828450cebc4071bcd4867cf657255744a4cf5c5b

  • SHA256

    b378ec0bf6c23b5896a942d12f8cdd915e8cc4d5ca3bc1886334bfb8ae642102

  • SHA512

    b2c8cf4c6137d206fb56e5fd3eeda2ca5920a8e2564d5e3f2627840ba78941d817f004e001ff1cbe73eff5bc176dc551c5db86958c58d6f2a3c50388676aa9c6

Malware Config

Extracted

Family

netwire

C2

uhie.hopto.org:3918

uhie2020.duckdns.org:3918

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    New_Rdp_June30

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      184237dfdea7399428139bbf06ecec05.exe

    • Size

      915KB

    • MD5

      184237dfdea7399428139bbf06ecec05

    • SHA1

      828450cebc4071bcd4867cf657255744a4cf5c5b

    • SHA256

      b378ec0bf6c23b5896a942d12f8cdd915e8cc4d5ca3bc1886334bfb8ae642102

    • SHA512

      b2c8cf4c6137d206fb56e5fd3eeda2ca5920a8e2564d5e3f2627840ba78941d817f004e001ff1cbe73eff5bc176dc551c5db86958c58d6f2a3c50388676aa9c6

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks