General

  • Target

    58486d0322d15db4d9302a47227c90e11b16eefc0b7b583199e0a5cd47c686ba

  • Size

    411KB

  • Sample

    221127-mx2n9sfb3y

  • MD5

    8e07c0c848eb45f051bf5b5b9fa9342b

  • SHA1

    94c6ef17ab992c825899776ab1b43ae581d78ad5

  • SHA256

    58486d0322d15db4d9302a47227c90e11b16eefc0b7b583199e0a5cd47c686ba

  • SHA512

    5a337108b6189bfbb36741549cfcafbb7680f74cb786c6c4cfe0c2423a6411e7ad0acff95420b084a5e82acff17a4244c9dff666785498b77ba2d87be57fd9f3

  • SSDEEP

    6144:PPxPf8mAyvJcMT4zB60JMVJos3flLzuBhFpFW2RT/Bo6BGWH0Vi5nTQTaWbvEX4U:PPjAyiicVjs93uL3Ft7o4LHJpTR4I1

Malware Config

Targets

    • Target

      vMail_39480.exe

    • Size

      470KB

    • MD5

      67708909977b3ec3d3038863535b6ed5

    • SHA1

      64e80a4d3430f9f5b356067688ef9d07c3efa497

    • SHA256

      4a3a2ac49bdd4c12ead7079ade8ee18fa9b6e66f07dcca8a40c7398d611f6fe1

    • SHA512

      baa0d305102473d91ffcefa9fd58dac56487acf13034a233345e69c127c0c67b51890db98f5477ab7c96085d84d506bb19549fcdd2f96332ad8ea66cf765ffe3

    • SSDEEP

      6144:w3IxPgjy5gaC/Cz3twFitux975DEtd1oYOp4ztXAIQpLpWJ8jb5iBuaGv9auwErX:dkyt3thtux9GH5qywE8nImlauwE93Us

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks