General

  • Target

    545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0

  • Size

    183KB

  • Sample

    240410-m39basdc97

  • MD5

    ead29687b7c4e76c59269e76a85341b7

  • SHA1

    e4358328f8547d837e42fe5f9a516cba1b00c2ee

  • SHA256

    545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0

  • SHA512

    ba57dbb371e40f792f9e69d37bb54a74858890de72e4a5e01ccfb1f83053cb15e71de5fa25c8df748e299247ab34a3aed97acbc6153c01de7f5f348e5f043b5c

  • SSDEEP

    3072:2PDMqqDLy/QmY2hDO1woouAq1cBGpH+H97k0n3i/Us3mPrONNKTdZdvj:ZqqDLuxv8VzA6cO23GUsWUNSn

Malware Config

Extracted

Family

netwire

C2

claraoliveira.serveblog.net:4100

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    24.01.17

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Dr#JgN43K@i6@92E401g

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0

    • Size

      183KB

    • MD5

      ead29687b7c4e76c59269e76a85341b7

    • SHA1

      e4358328f8547d837e42fe5f9a516cba1b00c2ee

    • SHA256

      545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0

    • SHA512

      ba57dbb371e40f792f9e69d37bb54a74858890de72e4a5e01ccfb1f83053cb15e71de5fa25c8df748e299247ab34a3aed97acbc6153c01de7f5f348e5f043b5c

    • SSDEEP

      3072:2PDMqqDLy/QmY2hDO1woouAq1cBGpH+H97k0n3i/Us3mPrONNKTdZdvj:ZqqDLuxv8VzA6cO23GUsWUNSn

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks