General

  • Target

    33e1643b09d8120a840a9681e45b683bd78eccb133be44839d264155b498175d

  • Size

    806KB

  • Sample

    221127-cftl8afd9v

  • MD5

    4fd6408ed28576790741bafdd1fcab49

  • SHA1

    e17713b3e2751288bb12e16e4b45d95593faeb38

  • SHA256

    33e1643b09d8120a840a9681e45b683bd78eccb133be44839d264155b498175d

  • SHA512

    ab3894fdf60f01529c44f4b27784ac8963f2df3e9589d15603a5417c88dc83b5ae31a09a17cf6eada2e3907b36317670f8ce8c8a61b2afe83bf777e096256558

  • SSDEEP

    12288:zhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a5evi/r9xbcrLQWw0D8:5RmJkcoQricOIQxiZY1ia5eOEQW3D8

Malware Config

Targets

    • Target

      33e1643b09d8120a840a9681e45b683bd78eccb133be44839d264155b498175d

    • Size

      806KB

    • MD5

      4fd6408ed28576790741bafdd1fcab49

    • SHA1

      e17713b3e2751288bb12e16e4b45d95593faeb38

    • SHA256

      33e1643b09d8120a840a9681e45b683bd78eccb133be44839d264155b498175d

    • SHA512

      ab3894fdf60f01529c44f4b27784ac8963f2df3e9589d15603a5417c88dc83b5ae31a09a17cf6eada2e3907b36317670f8ce8c8a61b2afe83bf777e096256558

    • SSDEEP

      12288:zhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a5evi/r9xbcrLQWw0D8:5RmJkcoQricOIQxiZY1ia5eOEQW3D8

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks