General
-
Target
bebee16eea9946fb65b2c3eae3d03c155123ab890f98d733440561250ba8604d
-
Size
397KB
-
Sample
220521-bpmplafccj
-
MD5
0eb0f415368167b48d7e8763b3fa29dc
-
SHA1
56258ad24b8604cc918579254f0f4ae911250bdd
-
SHA256
bebee16eea9946fb65b2c3eae3d03c155123ab890f98d733440561250ba8604d
-
SHA512
5ce2a6f7e67119956e335a06eaae7436b22e9f63b22e0bcd921554759cf1440bfdb5cf7cba377e153761b43afd3c269c956e5ecddd63cf9c7b332587004009f1
Static task
static1
Behavioral task
behavioral1
Sample
CPA accountant COVID_19 pandemic relief (20,000$).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
CPA accountant COVID_19 pandemic relief (20,000$).exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
38.132.124.156:1199
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
12345
-
registry_autorun
true
-
startup_name
ronies
-
use_mutex
false
Targets
-
-
Target
CPA accountant COVID_19 pandemic relief (20,000$).exe
-
Size
584KB
-
MD5
1918fa86b99fda35462ec060e9c419bb
-
SHA1
3d393d15044bd193851297bdc94c38f44a6e1fd2
-
SHA256
a34bd4c266e3891796816854e78d62384dcf36a8f456476e69d0dacf109d1737
-
SHA512
b6cae10db3ecd2bebb5b017c7a09f46ef5a6f9a84747419d0b041b4b6b6769b43e4e4df2454d38c15b58f3a4e10f9d60eb416a1ef3383f32f8d62fd6a09dc15e
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-