General
-
Target
Ubnccbruoun7.exe
-
Size
446KB
-
Sample
201119-wg5pjv3myx
-
MD5
9635d5d0882e7ecd9234af3bfd2efa89
-
SHA1
10020cc25e075941784f0b969fe9466f7f61ac12
-
SHA256
dc4475e7d864b18f90b1a3b812d6f1e98d46fbb24771405c1b15c9c1cba8a10f
-
SHA512
d0a3dcac40a4af423a4eb83d174d3d47a9087527debcf9d8782efe5b186ddd25bbfd2b3c1d800c91d7b777059d826fc87cc8af18ff2bb98305ad453d9d40114b
Static task
static1
Behavioral task
behavioral1
Sample
Ubnccbruoun7.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Ubnccbruoun7.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Ubnccbruoun7.exe
-
Size
446KB
-
MD5
9635d5d0882e7ecd9234af3bfd2efa89
-
SHA1
10020cc25e075941784f0b969fe9466f7f61ac12
-
SHA256
dc4475e7d864b18f90b1a3b812d6f1e98d46fbb24771405c1b15c9c1cba8a10f
-
SHA512
d0a3dcac40a4af423a4eb83d174d3d47a9087527debcf9d8782efe5b186ddd25bbfd2b3c1d800c91d7b777059d826fc87cc8af18ff2bb98305ad453d9d40114b
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-