General
-
Target
KMS.exe
-
Size
1.7MB
-
Sample
231009-x59d7afg8y
-
MD5
0f7ae75bde16c261d817cf6fab4e7770
-
SHA1
030733fd3ed1ad22a1842ee53ffc7ae312652ecd
-
SHA256
6d880189693cf93dd4ca145b0d3cc8e9295da375654d04ea68a5f67c9f62ae87
-
SHA512
51698c963bd829c6875d6d70e4e3f44cd99b87bcb2b589f0a1d268cec008a07cd8d9182a51b0eb7714b8cd0c0261e1e279a0404ef59b5877a6e6d5f1c2f69f67
-
SSDEEP
1536:RbEp4Z40d4I4I4I4I4I4I4I4I4V3424GI5Ac4dONlIKO67gHrc64hUQyOCH1Rog5:Rbnfu
Static task
static1
Malware Config
Extracted
netwire
haija.mine.nu:1338
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Alien
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
KMS.exe
-
Size
1.7MB
-
MD5
0f7ae75bde16c261d817cf6fab4e7770
-
SHA1
030733fd3ed1ad22a1842ee53ffc7ae312652ecd
-
SHA256
6d880189693cf93dd4ca145b0d3cc8e9295da375654d04ea68a5f67c9f62ae87
-
SHA512
51698c963bd829c6875d6d70e4e3f44cd99b87bcb2b589f0a1d268cec008a07cd8d9182a51b0eb7714b8cd0c0261e1e279a0404ef59b5877a6e6d5f1c2f69f67
-
SSDEEP
1536:RbEp4Z40d4I4I4I4I4I4I4I4I4V3424GI5Ac4dONlIKO67gHrc64hUQyOCH1Rog5:Rbnfu
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
Turns off Windows Defender SpyNet reporting
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1