General

  • Target

    92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77

  • Size

    1.1MB

  • Sample

    230129-yej72sbc24

  • MD5

    4cebadb09cb1c3823c181fddb594bfac

  • SHA1

    4398791a02dcfbe616a63f68d1bb3721e51d071e

  • SHA256

    92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77

  • SHA512

    ea6502cc39d5e83411db629820f9c43c20876bd4554bf2f8f80ba79f6372552486c09693a6a416aaa1d1d5325c2cf33437b888d022398785eb69a58759372bcc

  • SSDEEP

    12288:LRG7xFeew+B6PVaJvEUNItZTWtAFpnxkhwIBlEvbkE3BAUVwUU9SlqjQt8MpsPTU:UlJvEUNeWapn+aIBlEvYIbKbcIAIT

Malware Config

Extracted

Family

netwire

C2

bedahogs.100chickens.me:6065

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Msc.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    ABsbWEPM

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    MscRun

  • use_mutex

    true

Targets

    • Target

      92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77

    • Size

      1.1MB

    • MD5

      4cebadb09cb1c3823c181fddb594bfac

    • SHA1

      4398791a02dcfbe616a63f68d1bb3721e51d071e

    • SHA256

      92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77

    • SHA512

      ea6502cc39d5e83411db629820f9c43c20876bd4554bf2f8f80ba79f6372552486c09693a6a416aaa1d1d5325c2cf33437b888d022398785eb69a58759372bcc

    • SSDEEP

      12288:LRG7xFeew+B6PVaJvEUNItZTWtAFpnxkhwIBlEvbkE3BAUVwUU9SlqjQt8MpsPTU:UlJvEUNeWapn+aIBlEvYIbKbcIAIT

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks