General

  • Target

    KONTOAUSZUG.exe

  • Size

    992KB

  • Sample

    220811-pnhwxahea3

  • MD5

    37d87eaf0eaadd2da6168f952fea9d8e

  • SHA1

    8a7612b99dad36da3a88bdf9ce888de19a9c2be1

  • SHA256

    ca6e08d293d450577e851f2802190871e5eff5e0de36915151f63f421eaeaf13

  • SHA512

    a1748f0e12c3882783e92093c6198dd9b958fa4099ef69d3f734fa8768c3c114da5a80d25a3419adb7f9735832b4ab402a3b03a22eab85949622dec991cf3bc2

Malware Config

Extracted

Family

netwire

C2

xman2.duckdns.org:4433

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      KONTOAUSZUG.exe

    • Size

      992KB

    • MD5

      37d87eaf0eaadd2da6168f952fea9d8e

    • SHA1

      8a7612b99dad36da3a88bdf9ce888de19a9c2be1

    • SHA256

      ca6e08d293d450577e851f2802190871e5eff5e0de36915151f63f421eaeaf13

    • SHA512

      a1748f0e12c3882783e92093c6198dd9b958fa4099ef69d3f734fa8768c3c114da5a80d25a3419adb7f9735832b4ab402a3b03a22eab85949622dec991cf3bc2

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks