General

  • Target

    e1f43f3aa18f4c82ce5454e0670d1f3effb8c7e66a88258983459a3d2668cb2e

  • Size

    172KB

  • Sample

    240325-1lzx7ahh67

  • MD5

    c77a42c1744c454e28d0b962eccf8951

  • SHA1

    fb1ec7b8e7c234531df577787026e72d4ded1d40

  • SHA256

    e1f43f3aa18f4c82ce5454e0670d1f3effb8c7e66a88258983459a3d2668cb2e

  • SHA512

    d78d1f1a37451c176b0f0fb132ea581599f062c03a2a3806f27afe2ef4f5216aee3dab939d3ff0bfee4e246b27178bfdcf5e4c7b638e01a48d274e814dea6dfc

  • SSDEEP

    3072:KAx0uG+7EKz3oNCWQpEk5Z2d3qsjgjoWqBddRG1bkfM23nyj6Rh7fNch:r3T7E6oNFQSd39jgEWSjRw2R7f

Malware Config

Extracted

Family

netwire

C2

87.106.76.212:8081

glassmex.no-ip.org:8081

loopsoup.no-ip.org:8081

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Adobe\Components\armsvc.exe

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Microsoft\Office\

  • lock_executable

    true

  • mutex

    CfqTWdpW

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    Adobe

  • use_mutex

    true

Targets

    • Target

      e1f43f3aa18f4c82ce5454e0670d1f3effb8c7e66a88258983459a3d2668cb2e

    • Size

      172KB

    • MD5

      c77a42c1744c454e28d0b962eccf8951

    • SHA1

      fb1ec7b8e7c234531df577787026e72d4ded1d40

    • SHA256

      e1f43f3aa18f4c82ce5454e0670d1f3effb8c7e66a88258983459a3d2668cb2e

    • SHA512

      d78d1f1a37451c176b0f0fb132ea581599f062c03a2a3806f27afe2ef4f5216aee3dab939d3ff0bfee4e246b27178bfdcf5e4c7b638e01a48d274e814dea6dfc

    • SSDEEP

      3072:KAx0uG+7EKz3oNCWQpEk5Z2d3qsjgjoWqBddRG1bkfM23nyj6Rh7fNch:r3T7E6oNFQSd39jgEWSjRw2R7f

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks