General

  • Target

    de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788

  • Size

    1.8MB

  • Sample

    240410-rvhktsec5z

  • MD5

    3e597147b7f94ea1cce064c11edffc42

  • SHA1

    b0c99c182b72ebe313e16fe8baa12e211a43719e

  • SHA256

    de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788

  • SHA512

    4b596a8d942facc979af49ab7d792ad2109333a0621c99c432cfca591364594c56c3df4b5231f0b9efa98f437b932990770b0651fd530777714c7c7757aac3bf

  • SSDEEP

    49152:CZ0vs+yQeQlKyXsZdRtoVqq0xzBJGD4YOFltFAYH:CKvsZHQlKyc1o0ZbeNO7QYH

Malware Config

Extracted

Family

netwire

C2

researchplanet.zapto.org:1810

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    GroupMTwo

  • keylogger_dir

    %AppData%\Diagnostics\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    kte5OCJBj0k0D9RY6dq0

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

latentbot

C2

researchplanet.zapto.org

Targets

    • Target

      de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788

    • Size

      1.8MB

    • MD5

      3e597147b7f94ea1cce064c11edffc42

    • SHA1

      b0c99c182b72ebe313e16fe8baa12e211a43719e

    • SHA256

      de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788

    • SHA512

      4b596a8d942facc979af49ab7d792ad2109333a0621c99c432cfca591364594c56c3df4b5231f0b9efa98f437b932990770b0651fd530777714c7c7757aac3bf

    • SSDEEP

      49152:CZ0vs+yQeQlKyXsZdRtoVqq0xzBJGD4YOFltFAYH:CKvsZHQlKyc1o0ZbeNO7QYH

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks