General

  • Target

    e14889a6a4d5d4e38d38a82200289362f1753dd64c2124124a72b2c9ff6fad06

  • Size

    552KB

  • Sample

    221028-2mnrzsaggj

  • MD5

    912ed968ae23d5a278a7a06a861e58ed

  • SHA1

    1407673c67ba2037f4f20d9438e6f556e5206447

  • SHA256

    e14889a6a4d5d4e38d38a82200289362f1753dd64c2124124a72b2c9ff6fad06

  • SHA512

    7e66a24e26220037b9bf22e54ee348b88060e620dd04aa4fbcdcb6b85542d0789083e2cc4be44e77f3c150a4513a1c0896ba1779810759e7b7a2eae7be5cd844

  • SSDEEP

    12288:9K2mhAMJ/cPlky+4AjBUjyoN29thgZL8oV2WRsLjCSbLRi3u5dQU2R4I+lm1Yf+n:s2O/Glky+3jBUjyoNengZL8y26sLjjNG

Malware Config

Targets

    • Target

      e14889a6a4d5d4e38d38a82200289362f1753dd64c2124124a72b2c9ff6fad06

    • Size

      552KB

    • MD5

      912ed968ae23d5a278a7a06a861e58ed

    • SHA1

      1407673c67ba2037f4f20d9438e6f556e5206447

    • SHA256

      e14889a6a4d5d4e38d38a82200289362f1753dd64c2124124a72b2c9ff6fad06

    • SHA512

      7e66a24e26220037b9bf22e54ee348b88060e620dd04aa4fbcdcb6b85542d0789083e2cc4be44e77f3c150a4513a1c0896ba1779810759e7b7a2eae7be5cd844

    • SSDEEP

      12288:9K2mhAMJ/cPlky+4AjBUjyoN29thgZL8oV2WRsLjCSbLRi3u5dQU2R4I+lm1Yf+n:s2O/Glky+3jBUjyoNengZL8y26sLjjNG

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks