General

  • Target

    dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461

  • Size

    382KB

  • Sample

    240410-rtegsabb37

  • MD5

    61c22386df656f32f45bc1928a1e5a94

  • SHA1

    3f448c01907cf6dc39c3cdd4860accf5f222aff6

  • SHA256

    dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461

  • SHA512

    14e32e6b8e14b8c128515dda07d50c2b2da2a50ff60fff6b9a29d04000100b45e9fa79689ba2da36de7082257963005d33332ff30dbb121631eb405031de4c41

  • SSDEEP

    6144:Bz+92mhAMJ/cPl3i8/hwJBXvJ+AiSWnmRR/Iq1ipEH3fa9t7SroeR43ddDWQt1S2:BK2mhAMJ/cPlJiXv4Aivmr/opq3S9g8H

Malware Config

Extracted

Family

netwire

C2

atlaswebportal.zapto.org:4000

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    1.6_R1_26.12.15

  • keylogger_dir

    C:\NVIDIA\profile\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Micr0s0ft4456877

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

latentbot

C2

atlaswebportal.zapto.org

Targets

    • Target

      dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461

    • Size

      382KB

    • MD5

      61c22386df656f32f45bc1928a1e5a94

    • SHA1

      3f448c01907cf6dc39c3cdd4860accf5f222aff6

    • SHA256

      dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461

    • SHA512

      14e32e6b8e14b8c128515dda07d50c2b2da2a50ff60fff6b9a29d04000100b45e9fa79689ba2da36de7082257963005d33332ff30dbb121631eb405031de4c41

    • SSDEEP

      6144:Bz+92mhAMJ/cPl3i8/hwJBXvJ+AiSWnmRR/Iq1ipEH3fa9t7SroeR43ddDWQt1S2:BK2mhAMJ/cPlJiXv4Aivmr/opq3S9g8H

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks