General

  • Target

    1640-78-0x0000000000400000-0x0000000000434000-memory.dmp

  • Size

    208KB

  • Sample

    220926-lmqnksbecn

  • MD5

    e4db7211956908dda99d283d182f9dae

  • SHA1

    1266382aa6c17b528adad67b7e8a64db775fa1a5

  • SHA256

    f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60

  • SHA512

    3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e

Malware Config

Extracted

Family

netwire

C2

fuckfuck0.ddns.net:3871

Attributes
activex_autorun
false
copy_executable
false
delete_original
false
host_id
HostId-SmI2Ki
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
lock_executable
false
offline_keylogger
true
password
Password
registry_autorun
false
use_mutex
false

Targets

    • Target

      1640-78-0x0000000000400000-0x0000000000434000-memory.dmp

    • Size

      208KB

    • MD5

      e4db7211956908dda99d283d182f9dae

    • SHA1

      1266382aa6c17b528adad67b7e8a64db775fa1a5

    • SHA256

      f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60

    • SHA512

      3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation