General

  • Target

    INV03483287732.exe

  • Size

    782KB

  • Sample

    220801-c97e6sgdbp

  • MD5

    2fe9032113e6cad33dee260c180cf758

  • SHA1

    db6b2f0bc2936400b3b1c8c118a77d0ba4e61c57

  • SHA256

    171c720d3c447b5011c0de2a4669df9406bcf4ba7581c7e8582f4ad526bb43b2

  • SHA512

    70245873ee8fca013357437af10bd6a2a34cf094bb46a34466b91743943ab3ea4b561100a6768bec684f1a0f30f0e4ed9b643b4f8728da69141df7e886f86cde

Malware Config

Extracted

Family

netwire

C2

149.102.132.253:3399

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      INV03483287732.exe

    • Size

      782KB

    • MD5

      2fe9032113e6cad33dee260c180cf758

    • SHA1

      db6b2f0bc2936400b3b1c8c118a77d0ba4e61c57

    • SHA256

      171c720d3c447b5011c0de2a4669df9406bcf4ba7581c7e8582f4ad526bb43b2

    • SHA512

      70245873ee8fca013357437af10bd6a2a34cf094bb46a34466b91743943ab3ea4b561100a6768bec684f1a0f30f0e4ed9b643b4f8728da69141df7e886f86cde

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Tasks