General

  • Target

    vzuxPoloYvScgJV.exe

  • Size

    1.1MB

  • Sample

    221004-pk183sahc9

  • MD5

    6c93ca9c9d19004b46f029692b09e7b5

  • SHA1

    82c7d61220865f4977411eb0e95974eb4d7d06b6

  • SHA256

    af41bf8b0ab05a8ce14042fafb5e3e1e126573b605bad6ce258c7780ee374990

  • SHA512

    0865297e7937c89195e6702b38f9e09dda32b66e405af255938a5e41598c73edda0e74b4dc85e9a243b6aa1d7c7a7ecf92177d5337196f277b461aa50f12504b

  • SSDEEP

    24576:oqOo1rBbiH40p9LlWhZkzj9FCrxGf68MF1Ao76mZDQ:oq1Lt0XVzTaYf68Mz7Z

Malware Config

Extracted

Family

netwire

C2

212.193.29.37:3030

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    client

  • install_path

    %AppData%\Install\Host.exe

  • lock_executable

    false

  • mutex

    xcCpnqVL

  • offline_keylogger

    false

  • password

    123456

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      vzuxPoloYvScgJV.exe

    • Size

      1.1MB

    • MD5

      6c93ca9c9d19004b46f029692b09e7b5

    • SHA1

      82c7d61220865f4977411eb0e95974eb4d7d06b6

    • SHA256

      af41bf8b0ab05a8ce14042fafb5e3e1e126573b605bad6ce258c7780ee374990

    • SHA512

      0865297e7937c89195e6702b38f9e09dda32b66e405af255938a5e41598c73edda0e74b4dc85e9a243b6aa1d7c7a7ecf92177d5337196f277b461aa50f12504b

    • SSDEEP

      24576:oqOo1rBbiH40p9LlWhZkzj9FCrxGf68MF1Ao76mZDQ:oq1Lt0XVzTaYf68Mz7Z

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks