General

  • Target

    20b11d44b4ee8320455e755b40f263aa548750ed7c02e1a6f03337f61e25b2a8

  • Size

    833KB

  • Sample

    250212-jfydqsslhs

  • MD5

    16652e2d769991aa0a99adc429c1e5a2

  • SHA1

    2006c46a828c6f699fbe4012980bb957dc2b076d

  • SHA256

    20b11d44b4ee8320455e755b40f263aa548750ed7c02e1a6f03337f61e25b2a8

  • SHA512

    3f7c918cc60f6f8a251ce0bd749e8a09dacfe0fffceb8656d0f1fc1a0b1a94843efe44f94ae3bc31ff7b3a4e0a02fa8c70c1c0c858c2ac2aa37233d51ec0a6ab

  • SSDEEP

    24576:lm9vvaLdQpiGhd4fqerCDFRFSMUeYw8S9K33:lm9vvIQptperOFDfUe98/n

Malware Config

Extracted

Family

netwire

C2

154.16.93.177:3365

154.16.93.177:3368

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    stanley012345

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      Payment Notification.exe

    • Size

      985KB

    • MD5

      e74f81db191d9908262caa4969915996

    • SHA1

      5f437e6b4af5bda95c61fb04192743f97d4f2b30

    • SHA256

      14796fa693fd9ad320db492f9e7697f89a3c999be8edf43756189eee0cabb558

    • SHA512

      709c9e89e86e7d2f8f77ee120993f62360f9f950bbe8604d8fa6d0ebffc727d86a248949e7109997066881d2fed549efc039d990419cb02c9e85e35e7f30226b

    • SSDEEP

      24576:bNA3R5drX9jd944+qehoDvRSSMgsi5seYn8S9KRP:G59J9tehAvcflze4851

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks