General

  • Target

    036c7efdd1a4dbb64234227521f510498a938b67f3658363767ffb368cc692d9

  • Size

    51KB

  • Sample

    240417-pkcwgsgb4t

  • MD5

    74988b94f0fea5561307d3fdd5895bef

  • SHA1

    d90758c460987c871a793be417bffcaacf748903

  • SHA256

    036c7efdd1a4dbb64234227521f510498a938b67f3658363767ffb368cc692d9

  • SHA512

    614e247312a110722fe64c9cb2fbd7b0bac6a88d663865ba8207409d757c4284974553b586167dca95ef84793598198c9097294ebcff276750f39b6d47e197c1

  • SSDEEP

    1536:z/nAru3PTtfTNnOmLF2/LGcLa0Z6CNqkg:TnAaL7OdTvL0

Malware Config

Extracted

Family

netwire

C2

majika.gotdns.ch:1120

nik.pointto.us:1120

nikouh.pointto.us:1120

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    naza

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    CVkJEjPx

  • offline_keylogger

    true

  • password

    vodka

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.exe

    • Size

      132KB

    • MD5

      58d02ed4bc010363facf162ac2976905

    • SHA1

      0fdbd386a4cd8ac2edbd32a32a2fd5e8263bc38c

    • SHA256

      3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c

    • SHA512

      3287fee2405d95e03032339306253abb97d5c95b1da988f827192b4ca2c52615e271cf3f5ac58a3e3cb6a175b15d70300f86078f39145470391c0c9843daf673

    • SSDEEP

      1536:dtTSUSKzF0Lh9a7WraTWFbmDHVXWRVAzZ8MfUSl7Q3rw75ggZG:dt5SKzF0Lh9a7IGW9GHeOFVvc3rKZG

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

MITRE ATT&CK Matrix

Tasks