General

  • Target

    cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51

  • Size

    1.2MB

  • Sample

    220731-jzd47sfee2

  • MD5

    e87446d66075a90aa1b5f5b22aab3fef

  • SHA1

    3424ac9b9426faabd3fe1c5ceb0842ea324ba30d

  • SHA256

    cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51

  • SHA512

    5acc508a84580bb21087f3273e9a760e23e7d430e5db6bc6863631a9b0b41517a40db187d1a1bf80a2196cf501539527fa29d4341a475b6b43d98a7b3990112b

Malware Config

Extracted

Family

netwire

C2

160.116.15.155:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51

    • Size

      1.2MB

    • MD5

      e87446d66075a90aa1b5f5b22aab3fef

    • SHA1

      3424ac9b9426faabd3fe1c5ceb0842ea324ba30d

    • SHA256

      cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51

    • SHA512

      5acc508a84580bb21087f3273e9a760e23e7d430e5db6bc6863631a9b0b41517a40db187d1a1bf80a2196cf501539527fa29d4341a475b6b43d98a7b3990112b

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks