General

  • Target

    3a063843b86882f4adc81ec1cdfb7bca

  • Size

    594KB

  • Sample

    231231-ryn7sahha8

  • MD5

    3a063843b86882f4adc81ec1cdfb7bca

  • SHA1

    cbeb7aed619982f754d79ad2fe44cd20280a0638

  • SHA256

    cfc906e180861810f8d8a4b578116054ef6f84ab725196124af6450629c2c05a

  • SHA512

    fc9ebfb8e183a0bad00f6bc28e999c69929eb545d5a7fd2b1803076137c3ffb89888dc8a4aca113182e35106b7d3f6fd6483cf8ae7752f3d5a2732329a8c045b

  • SSDEEP

    12288:OJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuN:mirCkUo8fLBqmze9pS4a7qu9VdMkbIMZ

Malware Config

Extracted

Family

netwire

C2

automan.duckdns.org:3382

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    HDPAYslj

  • offline_keylogger

    true

  • password

    onelove82

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Targets

    • Target

      3a063843b86882f4adc81ec1cdfb7bca

    • Size

      594KB

    • MD5

      3a063843b86882f4adc81ec1cdfb7bca

    • SHA1

      cbeb7aed619982f754d79ad2fe44cd20280a0638

    • SHA256

      cfc906e180861810f8d8a4b578116054ef6f84ab725196124af6450629c2c05a

    • SHA512

      fc9ebfb8e183a0bad00f6bc28e999c69929eb545d5a7fd2b1803076137c3ffb89888dc8a4aca113182e35106b7d3f6fd6483cf8ae7752f3d5a2732329a8c045b

    • SSDEEP

      12288:OJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuN:mirCkUo8fLBqmze9pS4a7qu9VdMkbIMZ

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks