General

  • Target

    1fb6f5111d897067dac0ee98900dd4d801c0fcd54661b620179c4fb35abcfec4

  • Size

    172KB

  • Sample

    241126-zr243ayrhw

  • MD5

    24586762b03e906849a15895e99d261e

  • SHA1

    08ff863d6afb675acf30119da70fee5f871d46cb

  • SHA256

    1fb6f5111d897067dac0ee98900dd4d801c0fcd54661b620179c4fb35abcfec4

  • SHA512

    5ba96ba63a986974d740ef6236152802eb2bf4e8ca24c1f2e84868e412b0eb242d7890ca891fdc22b57d0beba97c1e7a44ecf4b884fdaaaad4036212ee90a609

  • SSDEEP

    3072:96RrEikYA0QdTh532O8QXJlx3er+jL7ScA96TElZIajM/naFhNlUw4WOXZzq:9d0Ih532Kd3zjL7S1kEl7jyaFJm6

Malware Config

Extracted

Family

netwire

C2

185.84.181.95:8977

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    LAGOS NAWA

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      1fb6f5111d897067dac0ee98900dd4d801c0fcd54661b620179c4fb35abcfec4

    • Size

      172KB

    • MD5

      24586762b03e906849a15895e99d261e

    • SHA1

      08ff863d6afb675acf30119da70fee5f871d46cb

    • SHA256

      1fb6f5111d897067dac0ee98900dd4d801c0fcd54661b620179c4fb35abcfec4

    • SHA512

      5ba96ba63a986974d740ef6236152802eb2bf4e8ca24c1f2e84868e412b0eb242d7890ca891fdc22b57d0beba97c1e7a44ecf4b884fdaaaad4036212ee90a609

    • SSDEEP

      3072:96RrEikYA0QdTh532O8QXJlx3er+jL7ScA96TElZIajM/naFhNlUw4WOXZzq:9d0Ih532Kd3zjL7S1kEl7jyaFJm6

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks