General

  • Target

    04e96a27c8ae98f43ec0d31cb06ee44b

  • Size

    485KB

  • Sample

    231229-1r3ahahbck

  • MD5

    04e96a27c8ae98f43ec0d31cb06ee44b

  • SHA1

    b5c0777f701fe128f66ceccdc8b532703f34625c

  • SHA256

    a659b12b3702908176e925fa920e42ff67435a60e025a608b52acd81f44e6f1e

  • SHA512

    046b4582e9b6da839c035b3cc0deae34e57aff2b13207cfa6e5d8f68efe071f21104d4c7e75693604d55d0c17923724d9e0b517814ccc75d67090b9ad050a8aa

  • SSDEEP

    6144:rSH+MbiH2r0uS11MMvEV9SlVwGP2b/xVz8I+1FudBFNc+186DClQ:rc+Mbip1BEV9o/2DuFyFNcWLDkQ

Malware Config

Extracted

Family

netwire

C2

warin.hopto.org:4320

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      04e96a27c8ae98f43ec0d31cb06ee44b

    • Size

      485KB

    • MD5

      04e96a27c8ae98f43ec0d31cb06ee44b

    • SHA1

      b5c0777f701fe128f66ceccdc8b532703f34625c

    • SHA256

      a659b12b3702908176e925fa920e42ff67435a60e025a608b52acd81f44e6f1e

    • SHA512

      046b4582e9b6da839c035b3cc0deae34e57aff2b13207cfa6e5d8f68efe071f21104d4c7e75693604d55d0c17923724d9e0b517814ccc75d67090b9ad050a8aa

    • SSDEEP

      6144:rSH+MbiH2r0uS11MMvEV9SlVwGP2b/xVz8I+1FudBFNc+186DClQ:rc+Mbip1BEV9o/2DuFyFNcWLDkQ

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks