General

  • Target

    37f300481c85b382f84cbde9e53b84997659ab49a2d11b089ac3ecf18933db0e

  • Size

    679KB

  • Sample

    221128-wy19kabb7v

  • MD5

    6849594bb5bf5ef5c7dad7c530d6e9dc

  • SHA1

    e067a1e42e718d561cd5a1d70b3cf7348e603947

  • SHA256

    37f300481c85b382f84cbde9e53b84997659ab49a2d11b089ac3ecf18933db0e

  • SHA512

    9ed5ae5e3123c37ccb75631c63b056e5531589aee823052877c05d972e8962644c55651a5202d669eef47932413f3ae939b7f3c020a2d325644dc38ee4ded46d

  • SSDEEP

    12288:mK2mhAMJ/cPl5SIFhjHfZqp38h7UZYE82Y5UKUL4n4y3Xp3SbSlNHNU:H2O/Gl5rdfR7g6zwm4m53Sb2rU

Malware Config

Targets

    • Target

      37f300481c85b382f84cbde9e53b84997659ab49a2d11b089ac3ecf18933db0e

    • Size

      679KB

    • MD5

      6849594bb5bf5ef5c7dad7c530d6e9dc

    • SHA1

      e067a1e42e718d561cd5a1d70b3cf7348e603947

    • SHA256

      37f300481c85b382f84cbde9e53b84997659ab49a2d11b089ac3ecf18933db0e

    • SHA512

      9ed5ae5e3123c37ccb75631c63b056e5531589aee823052877c05d972e8962644c55651a5202d669eef47932413f3ae939b7f3c020a2d325644dc38ee4ded46d

    • SSDEEP

      12288:mK2mhAMJ/cPl5SIFhjHfZqp38h7UZYE82Y5UKUL4n4y3Xp3SbSlNHNU:H2O/Gl5rdfR7g6zwm4m53Sb2rU

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks