General

  • Target

    4a3a2ac49bdd4c12ead7079ade8ee18fa9b6e66f07dcca8a40c7398d611f6fe1

  • Size

    470KB

  • Sample

    221127-mw8q7abd56

  • MD5

    67708909977b3ec3d3038863535b6ed5

  • SHA1

    64e80a4d3430f9f5b356067688ef9d07c3efa497

  • SHA256

    4a3a2ac49bdd4c12ead7079ade8ee18fa9b6e66f07dcca8a40c7398d611f6fe1

  • SHA512

    baa0d305102473d91ffcefa9fd58dac56487acf13034a233345e69c127c0c67b51890db98f5477ab7c96085d84d506bb19549fcdd2f96332ad8ea66cf765ffe3

  • SSDEEP

    6144:w3IxPgjy5gaC/Cz3twFitux975DEtd1oYOp4ztXAIQpLpWJ8jb5iBuaGv9auwErX:dkyt3thtux9GH5qywE8nImlauwE93Us

Malware Config

Targets

    • Target

      4a3a2ac49bdd4c12ead7079ade8ee18fa9b6e66f07dcca8a40c7398d611f6fe1

    • Size

      470KB

    • MD5

      67708909977b3ec3d3038863535b6ed5

    • SHA1

      64e80a4d3430f9f5b356067688ef9d07c3efa497

    • SHA256

      4a3a2ac49bdd4c12ead7079ade8ee18fa9b6e66f07dcca8a40c7398d611f6fe1

    • SHA512

      baa0d305102473d91ffcefa9fd58dac56487acf13034a233345e69c127c0c67b51890db98f5477ab7c96085d84d506bb19549fcdd2f96332ad8ea66cf765ffe3

    • SSDEEP

      6144:w3IxPgjy5gaC/Cz3twFitux975DEtd1oYOp4ztXAIQpLpWJ8jb5iBuaGv9auwErX:dkyt3thtux9GH5qywE8nImlauwE93Us

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks