General

  • Target

    58d02ed4bc010363facf162ac2976905.bin

  • Size

    51KB

  • Sample

    230410-btrt4sgb6s

  • MD5

    d8b77d90ce14c8970687cdb5ceef6244

  • SHA1

    95603a85d79441ad07d29f074e82cde855d04b91

  • SHA256

    56ebf05567c76a58d9556cf1f535ea7dd8d9fc3870ae47215739d9678ab6a872

  • SHA512

    90401b19ae77b523b1127bdf5b0c6a2bab57354802dd3e3e57096ff8d98e09f3bfca5c2d451fc059cd79bb096fbe2fac3a51383c761ce823fd1241d0322310c5

  • SSDEEP

    1536:uEflG7P3NI1bxRi0LikysrhjNY00Ygzrg:N9+Ej3jysrhjKVYgz0

Malware Config

Extracted

Family

netwire

C2

majika.gotdns.ch:1120

nik.pointto.us:1120

nikouh.pointto.us:1120

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    naza

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    CVkJEjPx

  • offline_keylogger

    true

  • password

    vodka

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.exe

    • Size

      132KB

    • MD5

      58d02ed4bc010363facf162ac2976905

    • SHA1

      0fdbd386a4cd8ac2edbd32a32a2fd5e8263bc38c

    • SHA256

      3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c

    • SHA512

      3287fee2405d95e03032339306253abb97d5c95b1da988f827192b4ca2c52615e271cf3f5ac58a3e3cb6a175b15d70300f86078f39145470391c0c9843daf673

    • SSDEEP

      1536:dtTSUSKzF0Lh9a7WraTWFbmDHVXWRVAzZ8MfUSl7Q3rw75ggZG:dt5SKzF0Lh9a7IGW9GHeOFVvc3rKZG

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

MITRE ATT&CK Matrix

Tasks