Malware Analysis Report

2025-08-10 22:19

Sample ID 220217-aly3saegg3
Target 7cc7af02d7b9a653b15e35fe1ffb00b03e53fbc0c92c31805a7bb7446826b8fe
SHA256 7cc7af02d7b9a653b15e35fe1ffb00b03e53fbc0c92c31805a7bb7446826b8fe
Tags
rat netwire
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7cc7af02d7b9a653b15e35fe1ffb00b03e53fbc0c92c31805a7bb7446826b8fe

Threat Level: Known bad

The file 7cc7af02d7b9a653b15e35fe1ffb00b03e53fbc0c92c31805a7bb7446826b8fe was found to be: Known bad.

Malicious Activity Summary

rat netwire

NetWire RAT payload

Netwire family

autoit_exe

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-02-17 00:18

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Netwire family

netwire

autoit_exe

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-02-17 00:18

Reported

2022-02-17 00:25

Platform

win7-en-20211208

Max time kernel

8s

Max time network

17s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-02-17 00:18

Reported

2022-02-17 00:25

Platform

win10v2004-en-20220113

Max time kernel

16s

Max time network

24s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
US 93.184.220.29:80 tcp

Files

N/A