General

  • Target

    7965036121.zip

  • Size

    707KB

  • Sample

    220909-rg8j4agcg2

  • MD5

    09e54c56557a6f4166c501117af0595c

  • SHA1

    3e2d06ab26b7030ca0d08a46f425c5e5c5dfdad7

  • SHA256

    31cf1377665d7f66697ef51d3b6f8e67988961835763b79c675c0999c5a7a925

  • SHA512

    160028938608b6a62c9783beaad00c8191b476a82da8bd9a518d73f0d4bc675f40c36e0d222b70c005f194d3e316767e71a2b412feba38ad089ed2f5f780cc21

  • SSDEEP

    12288:qq8z2zFni0OzJyPi1PTAMo/PByd0pMS1EdfbVBCBDSt8r/Gg1D1hEjVFRYnJmY4h:qq8z2RiZsPiV5iXqOAfbIOtunFLEBFRj

Malware Config

Extracted

Family

netwire

C2

podzeye2.duckdns.org:4433

podzeye2.duckdns.org:4411

podzeye2.duckdns.org:4422

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      ea32c3c39c8c3f83e95916262d37b5aa49c920a9356dcebfa639b8391413ae9a

    • Size

      808KB

    • MD5

      a2609cffa6b57d22ffbe342013f59847

    • SHA1

      9dd92ebe68c7b149cb09edebf7587adf7ee5a4e5

    • SHA256

      ea32c3c39c8c3f83e95916262d37b5aa49c920a9356dcebfa639b8391413ae9a

    • SHA512

      adb6409708564e0e4070e22c2f0786861f756721f6e2defb15e3e7dc4547336d5d7f70b347a3c0f105acae0ae312b08470154fe0ea09ee5a912cd1d76a4d2b9f

    • SSDEEP

      12288:SzE+eQ2iNEF75euLUDYGbOwUjJLN4DXwEBYHofeVs06RBteoqpo1cxWY4/:ZQ16Z5fSYv5vsXwVHofdYoqpo2

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks