General

  • Target

    SIM Swap Partner's Staff.docx.exe

  • Size

    649KB

  • Sample

    200712-xhsm9zr2cn

  • MD5

    421fea142d75f349e7ab849bcbb7eb51

  • SHA1

    ffca7676c442ad30521abacae9f177b924e533d9

  • SHA256

    f0d83e1cb17751183ffa5fd073d26287a8b6e003aeaccf75523824acc117beab

  • SHA512

    199b9165f36748bdc2ef188384dfa696c20f50f89266186361419049652a518d7d29ab49763e98a0bbd76ad0ffafd93da4d2eda2a573cb1f958c3f71420a5799

Malware Config

Targets

    • Target

      SIM Swap Partner's Staff.docx.exe

    • Size

      649KB

    • MD5

      421fea142d75f349e7ab849bcbb7eb51

    • SHA1

      ffca7676c442ad30521abacae9f177b924e533d9

    • SHA256

      f0d83e1cb17751183ffa5fd073d26287a8b6e003aeaccf75523824acc117beab

    • SHA512

      199b9165f36748bdc2ef188384dfa696c20f50f89266186361419049652a518d7d29ab49763e98a0bbd76ad0ffafd93da4d2eda2a573cb1f958c3f71420a5799

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Adds Run entry to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks