NETWIRE Dynamic Configuration Extraction — Elastic Security Labs
Tags
Common Information
Type | Value |
---|---|
UUID | 564d81b2-d50e-4824-a49c-7e2af6cae57f |
Fingerprint | 54716fab3d39da94 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Jan. 30, 2023, midnight |
Added to db | Nov. 19, 2023, 6:21 a.m. |
Last updated | Dec. 19, 2024, 12:04 a.m. |
Headline | NETWIRE Dynamic Configuration Extraction |
Title | NETWIRE Dynamic Configuration Extraction — Elastic Security Labs |
Detected Hints/Tags/Attributes | 31/1/70 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 306 | ✔ | Elastic Security Labs | https://www.elastic.co/security-labs/rss/feed.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | 20220627.duckdns.org |
|
Details | Domain | 1 | admin96.hopto.org |
|
Details | Domain | 2 | alice2019.myftp.biz |
|
Details | Domain | 1 | asorock1111.ddns.net |
|
Details | Domain | 5 | banqueislamik.ddrive.online |
|
Details | Domain | 1 | betterday.duckdns.org |
|
Details | Domain | 1 | bigman2021.duckdns.org |
|
Details | Domain | 1 | blazeblaze.ddns.net |
|
Details | Domain | 1 | chongmei33.myddns.rocks |
|
Details | Domain | 1 | clients.enigmasolutions.xyz |
|
Details | Domain | 1 | gracedynu.gleeze.com |
|
Details | Domain | 1 | ingobea.hopto.org |
|
Details | Domain | 2 | iphanyi.edns.biz |
|
Details | Domain | 1 | iphy.strangled.net |
|
Details | Domain | 1 | kimlee11.duckdns.org |
|
Details | Domain | 1 | loffgghh.duckdns.org |
|
Details | Domain | 1 | megaton.gleeze.com |
|
Details | Domain | 2 | moran101.duckdns.org |
|
Details | Domain | 1 | netuwaya.servecounterstrike.com |
|
Details | Domain | 1 | nowancenorly.ddns.net |
|
Details | Domain | 1 | podzeye.duckdns.org |
|
Details | Domain | 1 | podzeye2.duckdns.org |
|
Details | Domain | 1 | recoveryonpoint.duckdns.org |
|
Details | Domain | 1 | redlinea.top |
|
Details | Domain | 1 | roller.duckdns.org |
|
Details | Domain | 1 | rozayleekimishere.duckdns.org |
|
Details | Domain | 1 | sani990.duckdns.org |
|
Details | Domain | 1 | saturdaylivecheckthisout.duckdns.org |
|
Details | Domain | 1 | uhie.hopto.org |
|
Details | Domain | 1 | uhie2020.duckdns.org |
|
Details | Domain | 1 | wcbradley.duckdns.org |
|
Details | Domain | 1 | xman2.duckdns.org |
|
Details | Domain | 1 | zonedx.ddns.net |
|
Details | File | 1 | image5.jpg |
|
Details | File | 1 | output.nd |
|
Details | IPv4 | 1 | 139.28.38.235 |
|
Details | IPv4 | 1 | 149.102.132.253 |
|
Details | IPv4 | 1 | 184.75.221.115 |
|
Details | IPv4 | 1 | 185.136.165.182 |
|
Details | IPv4 | 1 | 185.140.53.139 |
|
Details | IPv4 | 1 | 185.140.53.144 |
|
Details | IPv4 | 1 | 185.140.53.154 |
|
Details | IPv4 | 1 | 185.140.53.61 |
|
Details | IPv4 | 1 | 185.216.71.251 |
|
Details | IPv4 | 1 | 194.36.111.59 |
|
Details | IPv4 | 1 | 194.5.98.126 |
|
Details | IPv4 | 1 | 194.5.98.178 |
|
Details | IPv4 | 1 | 194.5.98.188 |
|
Details | IPv4 | 1 | 194.5.98.65 |
|
Details | IPv4 | 1 | 212.193.29.37 |
|
Details | IPv4 | 5 | 212.193.30.230 |
|
Details | IPv4 | 1 | 213.152.161.249 |
|
Details | IPv4 | 1 | 217.151.98.163 |
|
Details | IPv4 | 1 | 23.105.131.166 |
|
Details | IPv4 | 1 | 37.0.14.199 |
|
Details | IPv4 | 1 | 37.0.14.203 |
|
Details | IPv4 | 2 | 37.0.14.206 |
|
Details | IPv4 | 1 | 37.0.14.208 |
|
Details | IPv4 | 1 | 37.0.14.214 |
|
Details | IPv4 | 1 | 37.120.217.243 |
|
Details | IPv4 | 1 | 51.161.104.138 |
|
Details | IPv4 | 1 | 54.145.6.146 |
|
Details | IPv4 | 1 | 80.66.64.136 |
|
Details | IPv4 | 1 | 85.209.134.105 |
|
Details | IPv4 | 1 | 85.31.46.78 |
|
Details | IPv4 | 1 | 94.156.35.40 |
|
Details | Yara rule | 1 | rule Windows_Trojan_Netwire_1 { meta: author = "Elastic Security" os = "Windows" arch = "x86" category_type = "Trojan" family = "Netwire" threat_name = "Windows.Trojan.Netwire" strings: $a = { 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C } condition: all of them } |
|
Details | Yara rule | 1 | rule Windows_Trojan_Netwire_2 { meta: author = "Elastic Security" os = "Windows" arch = "x86" category_type = "Trojan" family = "Netwire" threat_name = "Windows.Trojan.Netwire" strings: $a1 = "[%.2d/%.2d/%d %.2d:%.2d:%.2d]" fullword $a2 = "\\Login Data" $a3 = "SOFTWARE\\NetWire" fullword condition: 2 of them } |
|
Details | Yara rule | 1 | rule Windows_Trojan_Netwire_3 { meta: author = "Elastic Security" os = "Windows" arch = "x86" category_type = "Trojan" family = "Netwire" threat_name = "Windows.Trojan.Netwire" strings: $a = { C9 0F 44 C8 D0 EB 8A 44 24 12 0F B7 C9 75 D1 32 C0 B3 01 8B CE 88 44 } condition: all of them } |
|
Details | Yara rule | 1 | rule Windows_Trojan_Netwire_4 { meta: author = "Elastic Security" os = "Windows" arch = "x86" category_type = "Trojan" family = "Netwire" threat_name = "Windows.Trojan.Netwire" strings: $a1 = "http://%s%ComSpec" ascii fullword $a2 = "%c%.8x%s" ascii fullword $a3 = "%6\\6Z65dlNh\\YlS.dfd" ascii fullword $a4 = "GET %s HTTP/1.1" ascii fullword $a5 = "R-W65: %6:%S" ascii fullword $a6 = "PTLLjPq %6:%S -qq9/G.y" ascii fullword condition: 4 of them } |