General

  • Target

    TAX INVOICE 00893.xlsm

  • Size

    42KB

  • Sample

    220810-v9a13sfah6

  • MD5

    dfd371ebf737c86675d54224482f3bf3

  • SHA1

    e84195e5871bfef86c18563ebe7b6ad1077f81e5

  • SHA256

    e209b1e1be73d201c0cf316df426fa1e0c2b436acf2d8c269ac6694b936d839e

  • SHA512

    994ba3a222532826c82081eb92ecb6d5cd57faf162fbd5e84ec1679fa13def5813b48c0f0b40044adf92a72ea9c6778c66474690635a7d0597e0f7c43b4391f2

Malware Config

Extracted

Family

netwire

C2

194.5.98.126:3378

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Pass@2023

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      TAX INVOICE 00893.xlsm

    • Size

      42KB

    • MD5

      dfd371ebf737c86675d54224482f3bf3

    • SHA1

      e84195e5871bfef86c18563ebe7b6ad1077f81e5

    • SHA256

      e209b1e1be73d201c0cf316df426fa1e0c2b436acf2d8c269ac6694b936d839e

    • SHA512

      994ba3a222532826c82081eb92ecb6d5cd57faf162fbd5e84ec1679fa13def5813b48c0f0b40044adf92a72ea9c6778c66474690635a7d0597e0f7c43b4391f2

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks