General

  • Target

    46a2a241686073663c07b4141d0812671ae0b297701e0c5b5af7cf09e966c542

  • Size

    173KB

  • Sample

    221126-jcnp5acc23

  • MD5

    1c81df076211a39faece47986ba9b05c

  • SHA1

    df3567010f19df07419141518f1ce91ead0c85fe

  • SHA256

    46a2a241686073663c07b4141d0812671ae0b297701e0c5b5af7cf09e966c542

  • SHA512

    5544f6f55025ae4dd3e52f7b6f10f65e9c5cddc8de4f417496fb191246ad562d5646795a22e39d6f70b106f7f27f1b7f7bc02d5e6c12a13cd55277b9eca20d59

  • SSDEEP

    3072:FoIhc5cLm+ublCERvmz9JqNx23JaSX3ql4hG28HafOafaI:PCcLWTvW8NcaahTRzSI

Malware Config

Targets

    • Target

      46a2a241686073663c07b4141d0812671ae0b297701e0c5b5af7cf09e966c542

    • Size

      173KB

    • MD5

      1c81df076211a39faece47986ba9b05c

    • SHA1

      df3567010f19df07419141518f1ce91ead0c85fe

    • SHA256

      46a2a241686073663c07b4141d0812671ae0b297701e0c5b5af7cf09e966c542

    • SHA512

      5544f6f55025ae4dd3e52f7b6f10f65e9c5cddc8de4f417496fb191246ad562d5646795a22e39d6f70b106f7f27f1b7f7bc02d5e6c12a13cd55277b9eca20d59

    • SSDEEP

      3072:FoIhc5cLm+ublCERvmz9JqNx23JaSX3ql4hG28HafOafaI:PCcLWTvW8NcaahTRzSI

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks