General

  • Target

    a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f

  • Size

    219KB

  • Sample

    221001-zajw6aedc6

  • MD5

    69fe47844312a1dd8a8a4b64eace8bb0

  • SHA1

    1080345aa844d9e0202aeb15f8299a961b35adad

  • SHA256

    a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f

  • SHA512

    d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d

Malware Config

Targets

    • Target

      a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f

    • Size

      219KB

    • MD5

      69fe47844312a1dd8a8a4b64eace8bb0

    • SHA1

      1080345aa844d9e0202aeb15f8299a961b35adad

    • SHA256

      a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f

    • SHA512

      d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Discovery

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Privilege Escalation