Geofenced NetWire Campaigns | Proofpoint US By December 02, 2020 Proofpoint Threat Research Team Published: 2020-12-02 · Archived: 2026-04-06 00:46:00 UTC In November 2019 Proofpoint researchers uncovered email campaigns distributing NetWire, a widely used RAT. The campaigns used Bulgarian language lures, narrow geo targeting, geofencing, and had low message volume. Since then, Proofpoint has identified additional campaigns with matching attributes, including:  Bulgarian language email lures, a NetWire payload, the Command and Control (C2) domain, malware config password, and the Microsoft Word document author "vps". NetWire has been a widely employed tool since inception in 2002, offering malware for multiple operating systems, including Windows, MacOS, and Linux. The RAT is sold in underground forums for between $40 and $140 dollars.  Targeting and Email Lures  In October and early November 2020, Proofpoint researchers observed multiple low volume campaigns intended for less than 10 companies in the Aerospace, Industrial, Manufacturing, Construction, Energy, Financial Transaction Services, and Business Services verticals. While the spread across sectors in these campaigns is diverse, all companies have business operations in Bulgaria. Some have a supplier relationship to larger energy projects and aerospace manufacturing initiatives. The latest activity diverges in scope and scale from a previously observed NetWire campaign in June which delivered approximately 500 messages to about 150 customers across 40 verticals. That campaign was written in Bulgarian and leveraged themes from the largest national bank, Bulbank.    The current campaigns also are localized, in Bulgarian, and claim to include financial information or a notification of an open enforcement case initiated against the recipient. Two email campaigns later in October impersonated the Sofia Court House based out of Bulgaria. In the latest November campaign, one of the aerospace technology organizations was targeted again from October in a single phish and leveraging both spoofed infrastructure and document file name of the Bulgarian national Commission for Combating Corruption and Confiscation of Illegally Acquired Property (KPKONPI).   Below is an example of message characteristics observed in November 2019:    From: < bulgaria@caciaf[.]bg >   Subject: Деклариране на финансови активи ("Declaration of financial assets")  Attachments: kpkonpi_dv86.doc  https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 1 of 8 Figure 1: Microsoft Word attachment with enable macros message   Below is an example of message characteristics observed in January 2020:  From: Пътна полиция МВР  (“Road Police MBP pp@mvr[.]bg”)  Subject: Призовка за явяване в КАТ ("Summons to appear at the Traffic Police")  Attachments: prizovka_081419.doc  Below is an example of the email lure and message characteristics spotted in early October 2020:    From: ЧСИ Галин Костов  ("Private Enforcement Agent Galin Kostov")  Subject: Уведомление за образувано дело ("Notification of initiated case")  Attachments: Уведомление за  образувано дело DELO20205593.doc ("Notification of initiated case DELO20205593.doc")    https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 2 of 8 Figure 2: Bulgarian language email lure  Message body, translated from Bulgarian:  Hello,  With the present and on the basis. Art. 458 of the Civil Procedure Code in connection with Art. 191, para 3 of TPSC, I would like to inform you that an enforcement case has been initiated against you, pursuant to the Civil Procedure Code, in view of your outstanding liabilities to Telecom Group AD. In the attached document, you can get acquainted with the writ of execution issued by the Sofia City Court, as well as with the terms for enforcement, which will start running.  With respect,  Galin Kostov  Private bailiff reg. №854  Area of operation  Sofia City Court  Tel. [redacted]      Figure 3: Microsoft Word attachment with enable macros message  Below is an example of the email lure and message characteristics spotted a few days later in October 2020.  From: ЧСИ Галин Костов < kostov@gkostov[.]com > ("Private Enforcement Agent Galin Kostov")  Subject: Уведомление за образувано дело ("Notification of initiated case")  https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 3 of 8 Attachments: DELO20205593.doc      Figure 4: Bulgarian language email lure  Message body, translated from Bulgarian:  Hello,  With the present and on the basis. Art. 458 of the Civil Procedure Code in connection with Art. 191, para 3 of TPSC, I would like to inform you that an enforcement case has been initiated against you, pursuant to the Civil Procedure Code, in view of your outstanding liabilities to Telecom Group AD. In the attached document, you can get acquainted with the writ of execution issued by the Sofia City Court, as well as with the terms for enforcement, which will start running.  With respect,  Galin Kostov  Private bailiff reg. №854  Area of operation  Sofia City Court  Tel. [redacted]  https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 4 of 8 Figure 5: Microsoft Word attachment with enable macros message  Each of the email lures observed contained Microsoft Word documents with macros. Additionally, the Microsoft Word documents included the same text box describing the Office document as protected, along with instructions on how to enable editing and enable content for viewing.   Installation and Payload  Analysis of the Microsoft Word attachments shows that the macros, if enabled, conditionally load NetWire. Geofencing, or restricting access to content based on the user’s location, was observed in these campaigns. Specifically, the execution and download of NetWire occurs only if the user’s IP address is based in Bulgaria, otherwise, a 403 error will be displayed.    Interestingly, the Microsoft Word documents shared the same “author” and “last saved by” value, which was “vps”.  When the attachment is opened and macros enabled, the VBA macro within the Microsoft Word attachment will execute the built-in Microsoft tool certutil to download the NetWire payload.  The Microsoft tool certutil can be used with the urlcache and split flags to download and save a file to a specified directory.   Sample certutil downloading commands:    Malware Configuration and Persistence  NetWire is a multi-platform remote access tool (RAT) developed by World Wired Labs since 2012. NetWire gives threat actors several features, including:  File Manager (download, upload, and search for files)  System Manager (process and application manager)  https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 5 of 8 Password recovery (Firefox, IE, Chrome, Opera, Netscape, Seamonkey, Pidgin, Windows Live, Mozilla Thunderbird, Microsoft Outlook)  Keylogger  Screen Capture (takes a JPEG image on demand or at specified intervals)  Remote Shell (cmd.exe or /bin/sh)  Reverse Proxy (hybrid SOCKS4/5 server that works with NAT)  Proxifier  HTTP Downloader (supports custom save location and name)  The NetWire payloads in all observed campaigns included nearly identical configurations. Specifically, the C2 domain clients[.]enigmasolutions[.]xyz  and the password were the same.   Example configuration listed below:   C2List: clients[.]enigmasolutions[.]xyz:54578;  RC4_Key: c476b8e7afc13f4444cc71011019f21a  HostID: Cleint-SYeym4  Password: [redacted]  StartupKey: ruj  KeylogPath: C:\Users\< user >\AppData\Roaming\msr\  LocalPath: %AppData%\Microsoft\MMC\ruj.exe  ProxyType: None  ConnectInterval: 30  CopyToLocalPath: Yes  DeleteOriginalFile: No  LockExecutable: No  AllowMultipleInstances: No  OfflineKeyloger: Yes    The malware will establish persistence by adding an entry to the registry. For example, the NetWire malware value under the Microsoft Run registry “ruj” points to the NetWire payload in the AppData directory.    Key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ruj  Data: C:\Users\\AppData\Roaming\Microsoft\MMC\ruj.exe  Conclusion  On balance, the fall campaigns diverged from Bulgarian themed NetWire campaigns in the early summer in scope and scale. About half of the current recipients converged with and were included in the broader distribution observed earlier this summer. These campaigns distributed NetWire variants which used Bulgarian email lures, leveraged geofencing, and downloading EXEs through certutils. The low volume and tailored email lures suggest the actor put in effort to evade detection. The NetWire malware has been around since at least 2002 and has been consistently in use by various actors https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 6 of 8 across the threat landscape. This analysis shows groupings of similar campaigns distributing NetWire based on message attributes, email lures and language, Office document metadata, VBA Macro code, and malware configuration.    Indicators of Compromise (IOCs)  IOC  IOC Type  Description  TimeFrame  clients[.]enigmasolutions[.]xyz  Domain  NetWire Command and Control (C2)  November, 201 and October, 2 445324f6ea6c97a73152306e7c184564be87f8279bd986487311567551535be3  sha256  NetWire  October, 2020  081d2ae69aef65f892ba6c52662f707bc5b8193d591f6d797b4f8cef04f2bbc6   sha256  Microsoft Word Attachment - kpkonpi_dv86.doc  November, 201 fa740b0be24c1ebb829f7dbbd3cb6a02e9e8fc1f55df75376376a29cd2469169  sha256  Microsoft Word Attachment - delo20205593.doc  October, 2020  3d762bb49c4c23ee73024acffc5dff2f46a6f8a854a67814c9933d03291f21d1  sha256  Microsoft Word Attachment - delo20205593.doc  October, 2020  b65e6b99c90ee7a2fc90562cbe3eddb2c9fc9677f8a8790661849bf7a41b5b39  sha256  Microsoft Word Attachment - delo20205593.doc  October, 2020  1113da20724231a3df784dbc30d931a4f3653e1a5efbae9d6b0f32b5612aa43b  sha256  Microsoft Word Attachment - delo20205593.doc  October, 2020  c946fd9638e0bd00be4deef9a1f8767751b38343fb566c572a6c7715ff9d46d5  sha256  NetWire  October, 2020  hxxp[://]one[.]oziriss[.]club/fo/1s[.]exe  URL  NetWire  October, 2020  hxxp[://]one[.]oziriss[.]club/fo/4s[.]exe  URL  NetWire  October, 2020  hxxp[://]one[.]oziriss[.]club/fo/3s[.]exe  URL  NetWire  October, 2020  https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 7 of 8 hxxp[://]one[.]oziriss[.]club/fo/2s[.]exe  URL  NetWire  October, 2020  hxxp[://]one[.]oziriss[.]club/fo/3s[.]exe  URL  NetWire  October, 2020  hxxp[://]one[.]oziriss[.]club/ben/3s[.]exe  URL  NetWire  October, 2020  hxxp[://]def[.]nime[.]xyz:2095/sling/rwcore[.]exe  URL  NetWire  November, 201 Emerging Threats and Emerging Threats PRO Signatures  2829988 - ETPRO POLICY Observed MS Certutil User-Agent in HTTP Request  2830425 - ETPRO CURRENT_EVENTS Likely Evil Certutil Retrieving EXE  2831237 - ETPRO TROJAN Netwire RAT Keep-Alive (Outbound)  Source: https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns https://www.proofpoint.com/us/blog/threat-insight/geofenced-netwire-campaigns Page 8 of 8