General

  • Target

    2f8bac7792e921f228ea2c3283ad0cebe3adcab44998f0942393f4ecccedde7b

  • Size

    458KB

  • Sample

    221125-ylgqhaec3z

  • MD5

    07f2e80664bbc93b2d2cf289697e5613

  • SHA1

    13c40bbdeed4c3c72ab6e6b35b7f9cbb2f809b7c

  • SHA256

    2f8bac7792e921f228ea2c3283ad0cebe3adcab44998f0942393f4ecccedde7b

  • SHA512

    4ba088e13f60203eb14bf2f99bd81043a076b4b977dcf7e1dfc53eadddcf6ceea31d52e14b236eb373e2b9e273df1c061855f961d1ca6a9b0e33b80c1d30bfcf

  • SSDEEP

    6144:RzV6tU/R6stRZXF5jdmTLvucbq582C6O2pRsuxkV+C6OTPNQNsPhdfJ+ewgLligD:qtUUskzYi2VOOsuxfCnLiNyJ+wJigc

Malware Config

Targets

    • Target

      2f8bac7792e921f228ea2c3283ad0cebe3adcab44998f0942393f4ecccedde7b

    • Size

      458KB

    • MD5

      07f2e80664bbc93b2d2cf289697e5613

    • SHA1

      13c40bbdeed4c3c72ab6e6b35b7f9cbb2f809b7c

    • SHA256

      2f8bac7792e921f228ea2c3283ad0cebe3adcab44998f0942393f4ecccedde7b

    • SHA512

      4ba088e13f60203eb14bf2f99bd81043a076b4b977dcf7e1dfc53eadddcf6ceea31d52e14b236eb373e2b9e273df1c061855f961d1ca6a9b0e33b80c1d30bfcf

    • SSDEEP

      6144:RzV6tU/R6stRZXF5jdmTLvucbq582C6O2pRsuxkV+C6OTPNQNsPhdfJ+ewgLligD:qtUUskzYi2VOOsuxfCnLiNyJ+wJigc

    • Modifies WinLogon for persistence

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks