General

  • Target

    f691ceb879503623f0a13fd4a6da2b14a401d32e0784b15cfc92d3d32b747b43

  • Size

    273KB

  • Sample

    221126-nclyraah54

  • MD5

    47b0576cd56efd2581076882b6233d62

  • SHA1

    6e509f00b199181d40cb52af7043314892b8cee9

  • SHA256

    f691ceb879503623f0a13fd4a6da2b14a401d32e0784b15cfc92d3d32b747b43

  • SHA512

    bfca925e5e3dfec5a42803c31acc2c200b4137e1fc7b3b42fb8cd4f86036579bc27e2bf92d8f32748908c516e14c98f8ae646afee35f6822f100749a1b45f697

  • SSDEEP

    3072:WpdRkqWSHSk+BoCex5FLIiwGfgPVbybJAErBu7mHxfrYpMGoBvkHpd:2dRkqWSHSNBsiiwGqyxs7ivkJd

Malware Config

Targets

    • Target

      f691ceb879503623f0a13fd4a6da2b14a401d32e0784b15cfc92d3d32b747b43

    • Size

      273KB

    • MD5

      47b0576cd56efd2581076882b6233d62

    • SHA1

      6e509f00b199181d40cb52af7043314892b8cee9

    • SHA256

      f691ceb879503623f0a13fd4a6da2b14a401d32e0784b15cfc92d3d32b747b43

    • SHA512

      bfca925e5e3dfec5a42803c31acc2c200b4137e1fc7b3b42fb8cd4f86036579bc27e2bf92d8f32748908c516e14c98f8ae646afee35f6822f100749a1b45f697

    • SSDEEP

      3072:WpdRkqWSHSk+BoCex5FLIiwGfgPVbybJAErBu7mHxfrYpMGoBvkHpd:2dRkqWSHSNBsiiwGqyxs7ivkJd

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks