General

  • Target

    8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8

  • Size

    652KB

  • Sample

    220731-lv7xtsbfcr

  • MD5

    3c12d90906ea1d09effbd01ad9d1722c

  • SHA1

    bfe0d9c84344ef859e4f8d69d2d35d535aa31533

  • SHA256

    8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8

  • SHA512

    cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b

Malware Config

Targets

    • Target

      8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8

    • Size

      652KB

    • MD5

      3c12d90906ea1d09effbd01ad9d1722c

    • SHA1

      bfe0d9c84344ef859e4f8d69d2d35d535aa31533

    • SHA256

      8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8

    • SHA512

      cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks