General

  • Target

    9eced901d16388ed1ee39838e8f7e33c

  • Size

    3.1MB

  • Sample

    240215-22gxzsbf37

  • MD5

    9eced901d16388ed1ee39838e8f7e33c

  • SHA1

    824f2dafa284b2061c8facd329bc9863a9681635

  • SHA256

    ba870bb594dba9dfa2f35efc74f61069a768b7db0caba15938ae982f7c721f7e

  • SHA512

    bb06be40c3e1f18f68e105c488267a00f33abc658b3c63ed3fbd69931feeb571580539c45b5c20222bdc101652b9858b4d999cd7148bcb794a98468455946bc1

  • SSDEEP

    98304:CdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8X:CdNB4ianUstYuUR2CSHsVP8X

Malware Config

Extracted

Family

netwire

C2

174.127.99.159:7882

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    May-B

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

azorult

C2

https://gemateknindoperkasa.co.id/imag/index.php

Targets

    • Target

      9eced901d16388ed1ee39838e8f7e33c

    • Size

      3.1MB

    • MD5

      9eced901d16388ed1ee39838e8f7e33c

    • SHA1

      824f2dafa284b2061c8facd329bc9863a9681635

    • SHA256

      ba870bb594dba9dfa2f35efc74f61069a768b7db0caba15938ae982f7c721f7e

    • SHA512

      bb06be40c3e1f18f68e105c488267a00f33abc658b3c63ed3fbd69931feeb571580539c45b5c20222bdc101652b9858b4d999cd7148bcb794a98468455946bc1

    • SSDEEP

      98304:CdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8X:CdNB4ianUstYuUR2CSHsVP8X

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks