General

  • Target

    15be0713bcd6b6c3ca2ca062a711fb979bdd00194dacf9635cf84ee69ad5854d

  • Size

    222KB

  • Sample

    221130-wdx2eabh32

  • MD5

    76c090f1bbc12453b6046736daa7009b

  • SHA1

    d18483537a06195adae4376b66ebb992fa4f39be

  • SHA256

    15be0713bcd6b6c3ca2ca062a711fb979bdd00194dacf9635cf84ee69ad5854d

  • SHA512

    fe33ed15e6b13ad0e45222324ba75ebed11e6198427e2edd93d9ba7160b224f26e8062c0bdc3e8caff371e1a96940eae1c358da32aab9c819ce6559970194786

  • SSDEEP

    3072:3hvsRJUV7ZdyQod/TGEMVmoEzlWln9b4ct+bIF6LjFkF3karC1t1TB1Me6i9E:RvHT/GMdExW96ctdcL+F3karCJFGe6k

Malware Config

Extracted

Family

netwire

C2

haija.mine.nu:1338

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    aegistools2

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    qays1122

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      15be0713bcd6b6c3ca2ca062a711fb979bdd00194dacf9635cf84ee69ad5854d

    • Size

      222KB

    • MD5

      76c090f1bbc12453b6046736daa7009b

    • SHA1

      d18483537a06195adae4376b66ebb992fa4f39be

    • SHA256

      15be0713bcd6b6c3ca2ca062a711fb979bdd00194dacf9635cf84ee69ad5854d

    • SHA512

      fe33ed15e6b13ad0e45222324ba75ebed11e6198427e2edd93d9ba7160b224f26e8062c0bdc3e8caff371e1a96940eae1c358da32aab9c819ce6559970194786

    • SSDEEP

      3072:3hvsRJUV7ZdyQod/TGEMVmoEzlWln9b4ct+bIF6LjFkF3karC1t1TB1Me6i9E:RvHT/GMdExW96ctdcL+F3karCJFGe6k

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks