General
-
Target
Pay014_Screenshot.scr
-
Size
244KB
-
Sample
210705-gqmatgvh76
-
MD5
e56903f300876fd5df505a60f5967a31
-
SHA1
292fc1e81ab323b7de82a791d4f6bdd316605a7e
-
SHA256
40993feefb8af3c4a93426f9ff21815b24fa093fa650a9f46beae791e54ce8ce
-
SHA512
b760c9a8f74baba1782b972b288f3a27d27fb17cbe928a663472827fd3735a82e32f59fccf6a1a764ea397e49db561602c9e601f33656f93a494cc6c141e4368
Behavioral task
behavioral1
Sample
Pay014_Screenshot.scr
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Pay014_Screenshot.scr
Resource
win10v20210410
Malware Config
Extracted
netwire
iphanyi.mooo.com:3360
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
DNS Afraid
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
caster123
-
registry_autorun
false
- startup_name
-
use_mutex
false
Targets
-
-
Target
Pay014_Screenshot.scr
-
Size
244KB
-
MD5
e56903f300876fd5df505a60f5967a31
-
SHA1
292fc1e81ab323b7de82a791d4f6bdd316605a7e
-
SHA256
40993feefb8af3c4a93426f9ff21815b24fa093fa650a9f46beae791e54ce8ce
-
SHA512
b760c9a8f74baba1782b972b288f3a27d27fb17cbe928a663472827fd3735a82e32f59fccf6a1a764ea397e49db561602c9e601f33656f93a494cc6c141e4368
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-