General
-
Target
https://1drv.ms/u/s!AgM5TBFnYP0Mh3c2VflmNQ3jqh3W?e=hKhwu2
-
Sample
210705-k55rt84zv2
Score
10/10
Static task
static1
URLScan task
urlscan1
Sample
https://1drv.ms/u/s!AgM5TBFnYP0Mh3c2VflmNQ3jqh3W?e=hKhwu2
Behavioral task
behavioral1
Sample
https://1drv.ms/u/s!AgM5TBFnYP0Mh3c2VflmNQ3jqh3W?e=hKhwu2
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Malware Config
Extracted
Family
netwire
C2
iphanyi.mooo.com:3360
Attributes
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
DNS Afraid
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
caster123
-
registry_autorun
false
- startup_name
-
use_mutex
false
Targets
-
-
Target
https://1drv.ms/u/s!AgM5TBFnYP0Mh3c2VflmNQ3jqh3W?e=hKhwu2
Score10/10-
NetWire RAT payload
-
Core1 .NET packer
Detects packer/loader used by .NET malware.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-