General

  • Target

    646d389629b6cdee35dc820524f02bf44d3362e7a53c3efd0e98f0efa47ed179.exe

  • Size

    160KB

  • Sample

    241120-zdasnaxmdp

  • MD5

    437ef2f4d0fdc9801217db7117ccc7a8

  • SHA1

    1dbf3ff5e9c770480c99a6b12ba4273727421d62

  • SHA256

    646d389629b6cdee35dc820524f02bf44d3362e7a53c3efd0e98f0efa47ed179

  • SHA512

    38fdc688158272f3400ef5e822ddb09094dbf5c6b383beefa7682043f16d18308678b9fc0c53f5537e0f11bc900d00d90f03ccb58baf03880cb2ef7a42cb03fd

  • SSDEEP

    3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvhcYMjMqqDvFfv:jOTcK+NrRioGHlz8rz0i/hczQqqDvFfv

Malware Config

Extracted

Family

netwire

C2

bazerasedazacnetw139.xyz:2010

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Diabolikk66

  • lock_executable

    false

  • mutex

    CPsxxpUm

  • offline_keylogger

    false

  • password

    Ildiablo9012

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      646d389629b6cdee35dc820524f02bf44d3362e7a53c3efd0e98f0efa47ed179.exe

    • Size

      160KB

    • MD5

      437ef2f4d0fdc9801217db7117ccc7a8

    • SHA1

      1dbf3ff5e9c770480c99a6b12ba4273727421d62

    • SHA256

      646d389629b6cdee35dc820524f02bf44d3362e7a53c3efd0e98f0efa47ed179

    • SHA512

      38fdc688158272f3400ef5e822ddb09094dbf5c6b383beefa7682043f16d18308678b9fc0c53f5537e0f11bc900d00d90f03ccb58baf03880cb2ef7a42cb03fd

    • SSDEEP

      3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvhcYMjMqqDvFfv:jOTcK+NrRioGHlz8rz0i/hczQqqDvFfv

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

MITRE ATT&CK Enterprise v15

Tasks