General

  • Target

    b4cddfde06d2865b8a9159257a306956

  • Size

    1.1MB

  • Sample

    240305-qpkmkafg8x

  • MD5

    b4cddfde06d2865b8a9159257a306956

  • SHA1

    8442d322f8b3a4867a2e0b0a8bfdcb0d6f027b43

  • SHA256

    36acfd31af173ab9a7d9daf6dd7eaa29efc19cddd492847111f5cd0554db88b6

  • SHA512

    08531ce7812b1fad7d5009d7ce4eeb8eed9c10d877aaed45af75b8a7110c40041a3a984de9d0534ad5386279ab53ebfc4137850a6a64882d15194dd8992dcb0c

  • SSDEEP

    24576:1AOcZuj86SEqPGdvf6AH7bxk9ilugRp3fO+veit:/h86SEn9fDIiluQzt

Malware Config

Extracted

Family

netwire

C2

harold.ns01.info:3606

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Netwir

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    pHJVBoFH

  • offline_keylogger

    true

  • password

    master12

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      b4cddfde06d2865b8a9159257a306956

    • Size

      1.1MB

    • MD5

      b4cddfde06d2865b8a9159257a306956

    • SHA1

      8442d322f8b3a4867a2e0b0a8bfdcb0d6f027b43

    • SHA256

      36acfd31af173ab9a7d9daf6dd7eaa29efc19cddd492847111f5cd0554db88b6

    • SHA512

      08531ce7812b1fad7d5009d7ce4eeb8eed9c10d877aaed45af75b8a7110c40041a3a984de9d0534ad5386279ab53ebfc4137850a6a64882d15194dd8992dcb0c

    • SSDEEP

      24576:1AOcZuj86SEqPGdvf6AH7bxk9ilugRp3fO+veit:/h86SEn9fDIiluQzt

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks