General

  • Target

    e3d68e3484634f2133d390ec458c2f8e3763d5663a15df1103ec6555df873940

  • Size

    168KB

  • Sample

    221004-ggprwaedhk

  • MD5

    54ee381e756783fbe4f7d22ce9fb5409

  • SHA1

    9f36b2e555408ab4d58eff5fa73fc53253c1e3d5

  • SHA256

    e3d68e3484634f2133d390ec458c2f8e3763d5663a15df1103ec6555df873940

  • SHA512

    fb8f82119423d89d251dbd2e2105e7e3615a45a6cfb36ac3521318141cfa96e41febb7e9a7c0b1ac3e734571efd356b91a75c0b5fa162646bcc17e2f2b0853c8

  • SSDEEP

    3072:9IQUfIcSYq2wQAQCp5HOYbCyA7PrnMceCzzFStKHNg7c:dyjSYqwI5HA7PrnMcBzpStT

Malware Config

Targets

    • Target

      e3d68e3484634f2133d390ec458c2f8e3763d5663a15df1103ec6555df873940

    • Size

      168KB

    • MD5

      54ee381e756783fbe4f7d22ce9fb5409

    • SHA1

      9f36b2e555408ab4d58eff5fa73fc53253c1e3d5

    • SHA256

      e3d68e3484634f2133d390ec458c2f8e3763d5663a15df1103ec6555df873940

    • SHA512

      fb8f82119423d89d251dbd2e2105e7e3615a45a6cfb36ac3521318141cfa96e41febb7e9a7c0b1ac3e734571efd356b91a75c0b5fa162646bcc17e2f2b0853c8

    • SSDEEP

      3072:9IQUfIcSYq2wQAQCp5HOYbCyA7PrnMceCzzFStKHNg7c:dyjSYqwI5HA7PrnMcBzpStT

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Tasks