General

  • Target

    ae159f022c6073ba1354103afc1d80f713aea24f01875ac242b47789a24cb6f0N.exe

  • Size

    1.3MB

  • Sample

    250116-p17e2a1ldw

  • MD5

    7213f4e9e0e8bf90552fc6e925eb3d40

  • SHA1

    579aae55eae1873bf8611cca29883ade9380534f

  • SHA256

    ae159f022c6073ba1354103afc1d80f713aea24f01875ac242b47789a24cb6f0

  • SHA512

    5180119c129268599a6faacf3be7ec55074464b1a3f2fe81c324f39093b440be49e2bf471d717ec699fd778dbbec644e6e0aa55a9b9ac86f4caf88c7f95d42ac

  • SSDEEP

    24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaPanF0v6556ACILT5l:Jh+ZkldoPK8YaPgr8IBl

Malware Config

Extracted

Family

netwire

C2

193.56.28.162:3361

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    11

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    mpGoHcGu

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      ae159f022c6073ba1354103afc1d80f713aea24f01875ac242b47789a24cb6f0N.exe

    • Size

      1.3MB

    • MD5

      7213f4e9e0e8bf90552fc6e925eb3d40

    • SHA1

      579aae55eae1873bf8611cca29883ade9380534f

    • SHA256

      ae159f022c6073ba1354103afc1d80f713aea24f01875ac242b47789a24cb6f0

    • SHA512

      5180119c129268599a6faacf3be7ec55074464b1a3f2fe81c324f39093b440be49e2bf471d717ec699fd778dbbec644e6e0aa55a9b9ac86f4caf88c7f95d42ac

    • SSDEEP

      24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaPanF0v6556ACILT5l:Jh+ZkldoPK8YaPgr8IBl

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks