General

  • Target

    25794228f76b602cf9635438a838ae6a

  • Size

    738KB

  • Sample

    231231-dgvfkscgfj

  • MD5

    25794228f76b602cf9635438a838ae6a

  • SHA1

    cb078db4f8e8b8a498f7b3df4514733ecf3c9b30

  • SHA256

    8d37d45f0232f9c17f9835102323087a6c0e17cf9f4fdc9ebf8cfb857fe14934

  • SHA512

    fec5387df8c46bae11d1bd298f131120a7e98bfe285c1b96323efb28ba5c79d14c6437b8d16cdfe0f0d452cebfd10c675dfa1ccd493df2689990e8b6754f5783

  • SSDEEP

    12288:mFdMaC02iNv4so1jj457rEfdF6OIrNLriLuscos26aq7NG18dWSnvn+ilBM6xk:wfC01uso1jG7rodViNUugsIqK8djf+OD

Malware Config

Extracted

Family

netwire

C2

harold.ns01.info:3606

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    prim

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    eApkLVIW

  • offline_keylogger

    true

  • password

    master12

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      25794228f76b602cf9635438a838ae6a

    • Size

      738KB

    • MD5

      25794228f76b602cf9635438a838ae6a

    • SHA1

      cb078db4f8e8b8a498f7b3df4514733ecf3c9b30

    • SHA256

      8d37d45f0232f9c17f9835102323087a6c0e17cf9f4fdc9ebf8cfb857fe14934

    • SHA512

      fec5387df8c46bae11d1bd298f131120a7e98bfe285c1b96323efb28ba5c79d14c6437b8d16cdfe0f0d452cebfd10c675dfa1ccd493df2689990e8b6754f5783

    • SSDEEP

      12288:mFdMaC02iNv4so1jj457rEfdF6OIrNLriLuscos26aq7NG18dWSnvn+ilBM6xk:wfC01uso1jG7rodViNUugsIqK8djf+OD

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks