General

  • Target

    618042e17e94c7e843ba0ac1889d3a4b7e1c3157bd1d6806131060533df82ddd

  • Size

    240KB

  • Sample

    221130-qxfctaed88

  • MD5

    54b3a153f753fdc934796f0427a18fba

  • SHA1

    249bbd0fda56557898a6997ea3e30d19ac34fdaa

  • SHA256

    618042e17e94c7e843ba0ac1889d3a4b7e1c3157bd1d6806131060533df82ddd

  • SHA512

    4394f4fdb018951b4dfa987c777e9937630af93e7f2666347996b6f5de266e844a5836755e455afb50d09e8c4d6ac87dc430d4a5e033d6b6dee2c114aa4a1c61

  • SSDEEP

    6144:ib7jFYBiXBcygj8we79zMfrCcLkRFxh+JZakodZiDmmmmmmkX:sOBiXBLgjre7VMzCcLUFzqgkaIDmmmmT

Malware Config

Extracted

Family

netwire

C2

lamba.mywire.org:1604

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      618042e17e94c7e843ba0ac1889d3a4b7e1c3157bd1d6806131060533df82ddd

    • Size

      240KB

    • MD5

      54b3a153f753fdc934796f0427a18fba

    • SHA1

      249bbd0fda56557898a6997ea3e30d19ac34fdaa

    • SHA256

      618042e17e94c7e843ba0ac1889d3a4b7e1c3157bd1d6806131060533df82ddd

    • SHA512

      4394f4fdb018951b4dfa987c777e9937630af93e7f2666347996b6f5de266e844a5836755e455afb50d09e8c4d6ac87dc430d4a5e033d6b6dee2c114aa4a1c61

    • SSDEEP

      6144:ib7jFYBiXBcygj8we79zMfrCcLkRFxh+JZakodZiDmmmmmmkX:sOBiXBLgjre7VMzCcLUFzqgkaIDmmmmT

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks