General

  • Target

    3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.zip

  • Size

    51KB

  • Sample

    240402-q6rgfacb8y

  • MD5

    a719d099ff53f90f96cf3aee1d0d9635

  • SHA1

    fec83478b08f1da40a3bd6e30315f1cceee8ecaf

  • SHA256

    4d936b8c0fb681284f317ec71c9c2c81e54b02734ba267674e4f4463878570ac

  • SHA512

    a41e224f4bfeefe8c07a05aeef6bfac71b865b81695205a9b2f301b0f1d14a299549273e314284128b3b4f19220235c2adf217557bf51cb5987a2e25f022ee74

  • SSDEEP

    1536:lViUDCc7Bhe8oys3UFfmYfv1BXnvm6lGHO4O+m5FxR/g:pGgxBmEdBXvNAk5FxS

Malware Config

Extracted

Family

netwire

C2

majika.gotdns.ch:1120

nik.pointto.us:1120

nikouh.pointto.us:1120

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    naza

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    CVkJEjPx

  • offline_keylogger

    true

  • password

    vodka

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.exe

    • Size

      132KB

    • MD5

      58d02ed4bc010363facf162ac2976905

    • SHA1

      0fdbd386a4cd8ac2edbd32a32a2fd5e8263bc38c

    • SHA256

      3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c

    • SHA512

      3287fee2405d95e03032339306253abb97d5c95b1da988f827192b4ca2c52615e271cf3f5ac58a3e3cb6a175b15d70300f86078f39145470391c0c9843daf673

    • SSDEEP

      1536:dtTSUSKzF0Lh9a7WraTWFbmDHVXWRVAzZ8MfUSl7Q3rw75ggZG:dt5SKzF0Lh9a7IGW9GHeOFVvc3rKZG

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

MITRE ATT&CK Matrix

Tasks