General

  • Target

    1a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06.zip

  • Size

    668KB

  • Sample

    240402-qx5mpsca86

  • MD5

    15fcafdf000134725db5b4dc475d918b

  • SHA1

    ab81260cfa8fc22d0cf48f930dfe245a684bf946

  • SHA256

    c8fb598fcb0eed616cbdf26923ea98012374eb534b9ae232735bdc414f5d8ecd

  • SHA512

    2c53631a17c17ba789678b55f619c319c40780e1444ef4ae4e9739aef9163f7458fb08811142b6678f27d21ddea72bdee0a70d8221df46cef120493656d87ae2

  • SSDEEP

    12288:qhLnWnzxZjgwpZ366F2x9S4kbeYhuS0keVtyNUAbb0RCOR86v2t:qhbwxZtpc6F21kqxDD6U+bdOmNt

Malware Config

Extracted

Family

netwire

C2

halwachi50.mymediapc.net:5868

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      1a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06.exe

    • Size

      1.1MB

    • MD5

      9c6d1aca02db373a52401485c376d87e

    • SHA1

      9cc4435729a11d7c524d761b67de508b4474b206

    • SHA256

      1a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06

    • SHA512

      9f4aaadf939a97e2354f18ef1943594edf2c6eb04852e4fecc68ff1eeee9146ff1ec1ac26191f8c9435e39b765da23f14aa835313de670d3235e6b4eb890955d

    • SSDEEP

      24576:iCdxte/80jYLT3U1jfsWa/69ryeoEuGfYsoRzDQ:zw80cTsjkWa/FR4

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks