General

  • Target

    5b3692b40de137cd31116d42ed879e98ffce063ad118c88e83e0eb8eeda720a7

  • Size

    539KB

  • Sample

    220802-ax4gmsdadr

  • MD5

    b7e3a34777762e23320ac86a0dc0e13d

  • SHA1

    144e81a97b40bdd0c084d2bdb3de2f1b8cecc597

  • SHA256

    5b3692b40de137cd31116d42ed879e98ffce063ad118c88e83e0eb8eeda720a7

  • SHA512

    8b3d4f147115386d6b49c4858a17bf11558b3302ee86fc98033c8a886dd295bdfe8fdd2d064c5856309c3466e9656e19452cc5487a10d4fdf4ef1ce285c0f67a

Malware Config

Targets

    • Target

      5b3692b40de137cd31116d42ed879e98ffce063ad118c88e83e0eb8eeda720a7

    • Size

      539KB

    • MD5

      b7e3a34777762e23320ac86a0dc0e13d

    • SHA1

      144e81a97b40bdd0c084d2bdb3de2f1b8cecc597

    • SHA256

      5b3692b40de137cd31116d42ed879e98ffce063ad118c88e83e0eb8eeda720a7

    • SHA512

      8b3d4f147115386d6b49c4858a17bf11558b3302ee86fc98033c8a886dd295bdfe8fdd2d064c5856309c3466e9656e19452cc5487a10d4fdf4ef1ce285c0f67a

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks