General

  • Target

    RFQ for TLC-MR-CI-006- 174.3KB] TV-500-B(2008) pdf.exe

  • Size

    1.0MB

  • Sample

    221011-a6lm7afhf6

  • MD5

    5ec299aa2f897d33574bb541e4e0c5c2

  • SHA1

    454ebcd9bc4f0f975f71dd8ca73ae7488c70aa50

  • SHA256

    76a3ef3003f928ebb54af1c2d09ef78eeffb1e9a485f7e2913cf3443ec0425a4

  • SHA512

    593898a5c54a5e04eb6610a800dd9d08b558c014f8dbd325c5bc929d7cf3aa590a09ad886e4160468fd4f122a24f249fbe4a56a4351c14b0f03f5b0d39ea2f43

  • SSDEEP

    12288:alTQO2iNbJ2uOqc9kD4vib9H+g+rPz3BoLVpql8tmmblKOtyzzw2xR6Xq6:ID165qcWU2H+g+zzqLVpq6mgYOtyq

Malware Config

Extracted

Family

netwire

C2

kimlee11.duckdns.org:8839

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      RFQ for TLC-MR-CI-006- 174.3KB] TV-500-B(2008) pdf.exe

    • Size

      1.0MB

    • MD5

      5ec299aa2f897d33574bb541e4e0c5c2

    • SHA1

      454ebcd9bc4f0f975f71dd8ca73ae7488c70aa50

    • SHA256

      76a3ef3003f928ebb54af1c2d09ef78eeffb1e9a485f7e2913cf3443ec0425a4

    • SHA512

      593898a5c54a5e04eb6610a800dd9d08b558c014f8dbd325c5bc929d7cf3aa590a09ad886e4160468fd4f122a24f249fbe4a56a4351c14b0f03f5b0d39ea2f43

    • SSDEEP

      12288:alTQO2iNbJ2uOqc9kD4vib9H+g+rPz3BoLVpql8tmmblKOtyzzw2xR6Xq6:ID165qcWU2H+g+zzqLVpq6mgYOtyq

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks