General
-
Target
MONEY TRANSFER BANK RECEIPT.exe
-
Size
375KB
-
Sample
210616-re35ere4wn
-
MD5
e21fcaec897211bbf2ab31d39f6f0ce6
-
SHA1
7a65d01d6ebd99e902b55107f8f9c3610c824512
-
SHA256
79712cd9030282fbf73a6a8a0ada993f2b0f682d75a255cebf5a344896652306
-
SHA512
3de68fb30a5fbc3afa9a6fc0d9dea6c1cfa055e5243fd642bc6e0641fd4ae9121c926427f2303a57922280f0e0cc99b9371ff0246bb84098f3bcc0252a8d65f6
Static task
static1
Behavioral task
behavioral1
Sample
MONEY TRANSFER BANK RECEIPT.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
MONEY TRANSFER BANK RECEIPT.exe
Resource
win10v20210408
Malware Config
Extracted
netwire
warin.hopto.org:4320
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
- startup_name
-
use_mutex
false
Targets
-
-
Target
MONEY TRANSFER BANK RECEIPT.exe
-
Size
375KB
-
MD5
e21fcaec897211bbf2ab31d39f6f0ce6
-
SHA1
7a65d01d6ebd99e902b55107f8f9c3610c824512
-
SHA256
79712cd9030282fbf73a6a8a0ada993f2b0f682d75a255cebf5a344896652306
-
SHA512
3de68fb30a5fbc3afa9a6fc0d9dea6c1cfa055e5243fd642bc6e0641fd4ae9121c926427f2303a57922280f0e0cc99b9371ff0246bb84098f3bcc0252a8d65f6
Score10/10-
NetWire RAT payload
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-