General

  • Target

    d5a23a943397163bc154dc3fd424ee6ba6022df72804e2c5231eda496515b768

  • Size

    296KB

  • Sample

    220731-fnq3vaacep

  • MD5

    970f3b397fa42324f5573b95e61142b8

  • SHA1

    ca75d8928d20b0bc3389685d404b366f335f68d8

  • SHA256

    d5a23a943397163bc154dc3fd424ee6ba6022df72804e2c5231eda496515b768

  • SHA512

    c98ac113b467d15027d614dd8317f69f3ec270b2c2e4a16a363265c0072fad6e27c10d034ff1293c669284eaf78b787eeccb6bbc07d8bdced5dadd95e64c9602

Malware Config

Targets

    • Target

      d5a23a943397163bc154dc3fd424ee6ba6022df72804e2c5231eda496515b768

    • Size

      296KB

    • MD5

      970f3b397fa42324f5573b95e61142b8

    • SHA1

      ca75d8928d20b0bc3389685d404b366f335f68d8

    • SHA256

      d5a23a943397163bc154dc3fd424ee6ba6022df72804e2c5231eda496515b768

    • SHA512

      c98ac113b467d15027d614dd8317f69f3ec270b2c2e4a16a363265c0072fad6e27c10d034ff1293c669284eaf78b787eeccb6bbc07d8bdced5dadd95e64c9602

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks