General

  • Target

    540ee9bedf4c8b8020060d1aa86b9538b4e30a4efa10c8d5a00357a8a1220df0

  • Size

    131KB

  • Sample

    240417-p63n2ahf71

  • MD5

    fb2be7d58a31d52abe49f3d9a431921f

  • SHA1

    e78af44ad573d25f2884cfc317d9635eab27d7bd

  • SHA256

    540ee9bedf4c8b8020060d1aa86b9538b4e30a4efa10c8d5a00357a8a1220df0

  • SHA512

    0c0ca4b1ca01c375fb5204127055a70ecfea750d20faadcd65334ea75c80db06cfa966aa44c7202f303621a1662dce2223f6f08fe24cec9eb6224ffe82b62240

  • SSDEEP

    3072:05Ui2T9qBDp0aPM2hL0SJfEqnI1tS4FRmbrgtFZilJN:TKN0aE2hYBftKPgg3N

Malware Config

Extracted

Family

netwire

C2

winx.xcapdatap.capetown:7390

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Jagz_$$$

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    P@55w0rd!

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a.exe

    • Size

      208KB

    • MD5

      3b25677fa8107108e47bf97e9df675a6

    • SHA1

      fb4c79542cf166a2f7b099b65c43db58b6a01e68

    • SHA256

      c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a

    • SHA512

      71010fcba0fc1973b642332b25eda77eeda517c819e203b683fe005c3f5c332a86a7bd5fa5150e34f300577ec8404eac7e66ef3c91542ae90bb4bfd857edc280

    • SSDEEP

      3072:2H4l3KCxknsqA36giLi9YiE8qoX4Ot6QN05XRu+/glGMs4u8jQHVVy0b:2HCLqs12Li9YhqthN0RGFs+QH

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks