General

  • Target

    21daa55b09213ecdee0108b027b3aa53.bin

  • Size

    561KB

  • Sample

    240509-bmz7xaac4s

  • MD5

    21daa55b09213ecdee0108b027b3aa53

  • SHA1

    c6eb2d539531355ce9ce22fe029f0934065dbb7d

  • SHA256

    e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02

  • SHA512

    c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95

  • SSDEEP

    6144:C4xWH5KrIJU1TJqy4P5z4xWH5KrIJUXa+GAsebVLS37btJWB5DURZov5:OKbl0PnKHVseiBEBNt

Malware Config

Extracted

Family

netwire

C2

185.163.100.31:3364

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Frank321

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      21daa55b09213ecdee0108b027b3aa53.bin

    • Size

      561KB

    • MD5

      21daa55b09213ecdee0108b027b3aa53

    • SHA1

      c6eb2d539531355ce9ce22fe029f0934065dbb7d

    • SHA256

      e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02

    • SHA512

      c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95

    • SSDEEP

      6144:C4xWH5KrIJU1TJqy4P5z4xWH5KrIJUXa+GAsebVLS37btJWB5DURZov5:OKbl0PnKHVseiBEBNt

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks