General

  • Target

    Invoice.exe

  • Size

    566KB

  • Sample

    220727-n2al1shba7

  • MD5

    c0d2dfdb840f78a114b0a59f3fff0f67

  • SHA1

    6506d8f5e7f331ab107f61546e71bd3c7902a383

  • SHA256

    2000ada5b57a380a1b64080683830a5e8cb8b6a1a0e3859216090d01748b7b7c

  • SHA512

    0f4ff3a4c317cfc895a19bf28bee53d7e624e53a29b3cf55a2dd7dbaf072eb49d6af7cb128c40c03878f6ebb46116fc4176fdf0fafe3c89510584db09a66f4eb

Malware Config

Extracted

Family

netwire

C2

185.140.53.61:3363

185.140.53.61:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    move4ward

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      Invoice.exe

    • Size

      566KB

    • MD5

      c0d2dfdb840f78a114b0a59f3fff0f67

    • SHA1

      6506d8f5e7f331ab107f61546e71bd3c7902a383

    • SHA256

      2000ada5b57a380a1b64080683830a5e8cb8b6a1a0e3859216090d01748b7b7c

    • SHA512

      0f4ff3a4c317cfc895a19bf28bee53d7e624e53a29b3cf55a2dd7dbaf072eb49d6af7cb128c40c03878f6ebb46116fc4176fdf0fafe3c89510584db09a66f4eb

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks