General

  • Target

    8b0ecaf465b595c836fbe7b10ab524fc0929ba36aa7f17fd2651d217f7652f4b

  • Size

    126KB

  • Sample

    221126-wfjlsscf44

  • MD5

    7c54eedfc2644ae4415a70d0d80526bd

  • SHA1

    2a14bf02836d99a13961c9608d490fefd6ae3d78

  • SHA256

    8b0ecaf465b595c836fbe7b10ab524fc0929ba36aa7f17fd2651d217f7652f4b

  • SHA512

    6e9c58d37c85dd1e61564e45eb142fd55a1d02194f8939463b6dd9fa2a525b84fde4335f47e34d5ffec85e6488aca169314ee5417077bf6676e48394e8e27873

  • SSDEEP

    3072:VwJ52Y7ZoH5XJaalmjOWOxk5q5VMKtzhM+nmtLczh+4R24Ijvl8pZ8CSTh:VwHysalmjFOHMLL4RIjvl8pvSTh

Malware Config

Targets

    • Target

      8b0ecaf465b595c836fbe7b10ab524fc0929ba36aa7f17fd2651d217f7652f4b

    • Size

      126KB

    • MD5

      7c54eedfc2644ae4415a70d0d80526bd

    • SHA1

      2a14bf02836d99a13961c9608d490fefd6ae3d78

    • SHA256

      8b0ecaf465b595c836fbe7b10ab524fc0929ba36aa7f17fd2651d217f7652f4b

    • SHA512

      6e9c58d37c85dd1e61564e45eb142fd55a1d02194f8939463b6dd9fa2a525b84fde4335f47e34d5ffec85e6488aca169314ee5417077bf6676e48394e8e27873

    • SSDEEP

      3072:VwJ52Y7ZoH5XJaalmjOWOxk5q5VMKtzhM+nmtLczh+4R24Ijvl8pZ8CSTh:VwHysalmjFOHMLL4RIjvl8pvSTh

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks