General

  • Target

    5a29dba013d45eaedd2796c03fe312f66e39572a8b66ae5a7588f6396e72e3ce

  • Size

    829KB

  • Sample

    220802-e6b6zabaa2

  • MD5

    1f228893ae910cd9852120c1b504fc8b

  • SHA1

    364fffff7bbe71db8c80b4b2b42d25afffb11039

  • SHA256

    5a29dba013d45eaedd2796c03fe312f66e39572a8b66ae5a7588f6396e72e3ce

  • SHA512

    00009eb2293954f627d08165bfa306c720237269e75a030f47d7d63f7d7186dd3dca3ad533937223f5202dd856bb2294840eb6774023c5b7d50b319ffe0cd645

Malware Config

Extracted

Family

netwire

C2

5.133.11.63:4068

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Logs\

  • lock_executable

    true

  • offline_keylogger

    true

  • password

    Pedro1234

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      5a29dba013d45eaedd2796c03fe312f66e39572a8b66ae5a7588f6396e72e3ce

    • Size

      829KB

    • MD5

      1f228893ae910cd9852120c1b504fc8b

    • SHA1

      364fffff7bbe71db8c80b4b2b42d25afffb11039

    • SHA256

      5a29dba013d45eaedd2796c03fe312f66e39572a8b66ae5a7588f6396e72e3ce

    • SHA512

      00009eb2293954f627d08165bfa306c720237269e75a030f47d7d63f7d7186dd3dca3ad533937223f5202dd856bb2294840eb6774023c5b7d50b319ffe0cd645

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks