Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Linux security

Trapping the Netwire RAT on Linux

The Netwire remote access trojan (RAT) has left a trail of crumbs across various platforms. Here’s how it looks on Linux.

Tony Lambert
Originally published . Last modified .
ATT&CK IDTacticDescriptionNotes
ATT&CK ID:

XDG Autostart Entries

Tactic:

N/A

Description :

Netwire may persist using XDG Autostart Entries on Linux systems.

Notes :

The name may be configured by a user at the time of binary compilation.

ATT&CK ID:

Data Compressed (T1002)

Tactic:

Exfiltration

Description :

Netwire can automatically archive captured screenshots with compression.

Notes :
ATT&CK ID:

Application Window Discovery (T1010)

Tactic:

Discovery

Description :

Netwire can discover and close windows on controlled systems.

Notes :
ATT&CK ID:

System Network Configuration Discovery (T1016)

Tactic:

Discovery

Description :

Netwire contacts external domains to discover its public IP address.

Notes :

Netwire binaries are coded to use the domain checkip.dyndns.org

ATT&CK ID:

Data Encrypted (T1022)

Tactic:

Exfiltration

Description :

Netwire stores captured keystrokes in encrypted log files.

Notes :
ATT&CK ID:

Standard Cryptographic Protocol (T1032)

Tactic:

Command and Control

Description :

Netwire uses AES encryption for data transferred.

Notes :
ATT&CK ID:

System Owner/User Discovery (T1033)

Tactic:

Discovery

Description :

Netwire can discover logged on users.

Notes :
ATT&CK ID:

Masquerading (T1036)

Tactic:

Defense Evasion

Description :

Netwire RATs have masqueraded as other software. In addition, its network traffic masquerades as its user agent.

Notes :

Netwire has impersonated TeamViewer, macOS Finder, and other software. It commonly uses the user agent Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko.

Masquerading tests from Atomic Red Team

ATT&CK ID:

Software Packing (T1045)

Tactic:

Defense Evasion

Description :

Some campaigns using Netwire have used .NET packer tools for AV evasion.

Notes :
ATT&CK ID:

Scheduled Task (T1053)

Tactic:

Execution, Persistence, Privilege Escalation

Description :

Some campaigns using Netwire have used Scheduled Tasks for persistence.

Notes :

Scheduled Task functionality is not built into Netwire; it is usually implemented by another mechanism deploying Netwire.

Scheduled Task tests from Atomic Red Team

ATT&CK ID:

Process Injection (T1055)

Tactic:

Defense Evasion, Privilege Escalation

Description :

Some campaigns using Netwire have used process injection to shield execution from scrutiny.

Notes :

The code has been injected into system processes like notepad.exe, svchost.exe, and vbc.exe.

ATT&CK ID:

Input Capture (T1056)

Tactic:

Collection, Credential Access

Description :

Netwire can perform keylogging.

Notes :
ATT&CK ID:

Process Discovery (T1057)

Tactic:

Discovery

Description :

Netwire can discover and kill processes on controlled systems.

Notes :

This is performed without external commands.

ATT&CK ID:

Command-Line Interface (T1059)

Tactic:

Execution

Description :

Netwire can issue commands using cmd.exe and sh processes.

Notes :
ATT&CK ID:

Registry Run Keys / Startup Folder (T1060)

Tactic:

Persistence

Description :

Netwire creates a Registry start-up entry to establish persistence.

Notes :

The name may be configured by a user at the time of binary compilation.

Run key and Startup tests from Atomic Red Team

ATT&CK ID:

Local Job Scheduling (T1168)

Tactic:

Persistence, Execution

Description :

Netwire contains the ability to persist via cron jobs.

Notes :
ATT&CK ID:

Credentials in Files (T1081)

Tactic:

Credential Access

Description :

Netwire can retrieve passwords from messaging and mail client applications.

Notes :

Supported applications are Windows Live Messenger, Pidgin, Mozilla Thunderbird, and Microsoft Outlook.

ATT&CK ID:

System Information Discovery (T1082)

Tactic:

Discovery

Description :

Netwire can discover and collect victim system information

Notes :
ATT&CK ID:

Connection Proxy (T1090)

Tactic:

Command And Control, Defense Evasion

Description :

Netwire can proxy network traffic for a system.

Notes :
ATT&CK ID:

Process Hollowing (T1093)

Tactic:

Defense Evasion

Description :

Some campaigns using Netwire have used process hollowing to shield execution from scrutiny.

Notes :
ATT&CK ID:

Remote File Copy (T1105)

Tactic:

Command And Control, Lateral Movement

Description :

Netwire contains the ability to transfer files to remote systems.

Notes :
ATT&CK ID:

Modify Registry (T1112)

Tactic:

Defense Evasion

Description :

Netwire stores its configuration within the Windows Registry.

Notes :

The configuration information is usually stored under HKCU:\Software\Netwire

Modify Registry tests from Atomic Red Team

ATT&CK ID:

Screen Capture (T1113)

Tactic:

Collection

Description :

NETWIRE can capture the victim’s screen.

Notes :
ATT&CK ID:

Code Signing (T1116)

Tactic:

Defense Evasion

Description :

The Netwire client has been signed by fake and invalid digital certificates.

Notes :
ATT&CK ID:

Launch Agent (T1159)

Tactic:

Defense Evasion

Description :

Netwire contains macOS startup options for Launch Agents.

Notes :

The name may be configured by a user at the time of binary compilation.

Launch Agent tests from Atomic Red Team

ATT&CK ID:

Login Item (T1162)

Tactic:

Persistence

Description :

Netwire contains macOS startup options for Login Items.

Notes :

The name may be configured by a user at the time of binary compilation.

 

ATT&CK ID:

Credentials from Web Browsers (T1503)

Tactic:

Credential Access

Description :

Netwire can retrieve passwords from numerous web browsers.

Notes :

Supported browsers are Mozilla Firefox, Internet Explorer, Opera, Chromium, and SeaMonkey.

 

The detection engineer’s guide to Linux

 

Look beyond processes with Linux EDR

 

Contain yourself: An intro to Linux EDR

 

eBPFmon: A new tool for exploring and interacting with eBPF applications

Subscribe to our blog

 
 
Back to Top