General

  • Target

    63df87359c853538ba2814f07c2e47b112d2827d437e4baef14ebfdcfdb0a62e

  • Size

    136KB

  • Sample

    221122-y13araff93

  • MD5

    cef43cdb007639120a4a0d838d712193

  • SHA1

    a214a4ebcad9d9d0e083751db9d48c2a79a04c96

  • SHA256

    63df87359c853538ba2814f07c2e47b112d2827d437e4baef14ebfdcfdb0a62e

  • SHA512

    3537f805975d1456a676b4cd7b35cbdd2e802b701270842bb35ff6a9ba9a3ee0e9ed87a4b16ee0056219193e56cce46937ad02614f64196f292ef1f8be163ca2

  • SSDEEP

    3072:h4URpNUUX6z/DBXJfbjWzkCIqkTo7znirudL1jPeCUkHY:h4SUjhtbaods7zGEVPBL4

Malware Config

Targets

    • Target

      63df87359c853538ba2814f07c2e47b112d2827d437e4baef14ebfdcfdb0a62e

    • Size

      136KB

    • MD5

      cef43cdb007639120a4a0d838d712193

    • SHA1

      a214a4ebcad9d9d0e083751db9d48c2a79a04c96

    • SHA256

      63df87359c853538ba2814f07c2e47b112d2827d437e4baef14ebfdcfdb0a62e

    • SHA512

      3537f805975d1456a676b4cd7b35cbdd2e802b701270842bb35ff6a9ba9a3ee0e9ed87a4b16ee0056219193e56cce46937ad02614f64196f292ef1f8be163ca2

    • SSDEEP

      3072:h4URpNUUX6z/DBXJfbjWzkCIqkTo7znirudL1jPeCUkHY:h4SUjhtbaods7zGEVPBL4

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks