General

  • Target

    3b80379275525b22b147d73176d5686238b3f35e6f42e26ffebd7d0425bcc65d

  • Size

    124KB

  • Sample

    221201-lh4pmsee76

  • MD5

    c74ecf3d2a7c7507c9b37e91754242db

  • SHA1

    87d8cd54b3ec2c116a5aee01893de1bfb69321a6

  • SHA256

    3b80379275525b22b147d73176d5686238b3f35e6f42e26ffebd7d0425bcc65d

  • SHA512

    8f0b495f5847d9842c9f3c35f834da8066e5e5028ee279f5da51648b3182f3706ae5b2dc59389a60e5dab99ae31ddc2aa6163099ea089b99b39e0f564733e247

  • SSDEEP

    3072:6fHjCJGi0HHdlpc3ZGTdBvtBa4GP6u7qaJ:2Hj7ixZGpJtBfcZ7d

Malware Config

Targets

    • Target

      3b80379275525b22b147d73176d5686238b3f35e6f42e26ffebd7d0425bcc65d

    • Size

      124KB

    • MD5

      c74ecf3d2a7c7507c9b37e91754242db

    • SHA1

      87d8cd54b3ec2c116a5aee01893de1bfb69321a6

    • SHA256

      3b80379275525b22b147d73176d5686238b3f35e6f42e26ffebd7d0425bcc65d

    • SHA512

      8f0b495f5847d9842c9f3c35f834da8066e5e5028ee279f5da51648b3182f3706ae5b2dc59389a60e5dab99ae31ddc2aa6163099ea089b99b39e0f564733e247

    • SSDEEP

      3072:6fHjCJGi0HHdlpc3ZGTdBvtBa4GP6u7qaJ:2Hj7ixZGpJtBfcZ7d

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks