General

  • Target

    e6d92ae4bd68881ca34a4afa1a2fd890.exe

  • Size

    1.1MB

  • Sample

    220809-w4bk4aecdm

  • MD5

    e6d92ae4bd68881ca34a4afa1a2fd890

  • SHA1

    ab57049aab3945ef97766eb909fca8f700039c42

  • SHA256

    3a6ef5a50738a5230ca6c62f187b62b134ca090ba559f65c8a8204d9a66f724d

  • SHA512

    f6bbfb7ae64dbe6222258576dfbd6f1d66a6064a653471b5fbb1811b0870bce9a3fb3b6a3dba13d8e1e892670601307b13750336c731e8cf34fd3a54ac9ee89e

Malware Config

Extracted

Family

netwire

C2

185.140.53.154:3343

185.140.53.154:3345

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Pass@2022

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      e6d92ae4bd68881ca34a4afa1a2fd890.exe

    • Size

      1.1MB

    • MD5

      e6d92ae4bd68881ca34a4afa1a2fd890

    • SHA1

      ab57049aab3945ef97766eb909fca8f700039c42

    • SHA256

      3a6ef5a50738a5230ca6c62f187b62b134ca090ba559f65c8a8204d9a66f724d

    • SHA512

      f6bbfb7ae64dbe6222258576dfbd6f1d66a6064a653471b5fbb1811b0870bce9a3fb3b6a3dba13d8e1e892670601307b13750336c731e8cf34fd3a54ac9ee89e

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks