General

  • Target

    83f5a394d2446904a019f9a4890e9508c3bc11b7e800d19c19400a0c5ec44977

  • Size

    188KB

  • Sample

    221126-kkt3jsaa81

  • MD5

    eeb7dd2f4ab43e1f3d185baf132e1d2f

  • SHA1

    2374111362e99174bcee7a12b9d55f2631b26bc6

  • SHA256

    83f5a394d2446904a019f9a4890e9508c3bc11b7e800d19c19400a0c5ec44977

  • SHA512

    6d27e42bca6eff214c2addf9094d0bcb5ba515fc56b878ee9b3bf45a56d165f9c225888db064f290147b93a477e4b55834aa106f168200698555fd1cdadd5914

  • SSDEEP

    3072:l6N/WSr7GTOqBFrmNPJ9cmlGeoTQjKHhUp+TVvqJgsBf5IY/b81naBjB38d4BOew:lGWSrmwNPJ9rlGenOh4+TVvqJoEbikBt

Malware Config

Targets

    • Target

      83f5a394d2446904a019f9a4890e9508c3bc11b7e800d19c19400a0c5ec44977

    • Size

      188KB

    • MD5

      eeb7dd2f4ab43e1f3d185baf132e1d2f

    • SHA1

      2374111362e99174bcee7a12b9d55f2631b26bc6

    • SHA256

      83f5a394d2446904a019f9a4890e9508c3bc11b7e800d19c19400a0c5ec44977

    • SHA512

      6d27e42bca6eff214c2addf9094d0bcb5ba515fc56b878ee9b3bf45a56d165f9c225888db064f290147b93a477e4b55834aa106f168200698555fd1cdadd5914

    • SSDEEP

      3072:l6N/WSr7GTOqBFrmNPJ9cmlGeoTQjKHhUp+TVvqJgsBf5IY/b81naBjB38d4BOew:lGWSrmwNPJ9rlGenOh4+TVvqJoEbikBt

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks