General
-
Target
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f
-
Size
1.1MB
-
Sample
220625-3fq47sacf6
-
MD5
0b0cef96675cd85fdbbe3e8968cbf924
-
SHA1
4db5d5b0425e5b83224fa6b3611385edfe314d20
-
SHA256
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f
-
SHA512
b7e3805e7c184405973684e68235ab68bebcf050d70c68901d14f2c9b489baca481b956517151e42dcf59ca6d1a1348e1a33f47766f15459ce00360e59642e07
Static task
static1
Behavioral task
behavioral1
Sample
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f
-
Size
1.1MB
-
MD5
0b0cef96675cd85fdbbe3e8968cbf924
-
SHA1
4db5d5b0425e5b83224fa6b3611385edfe314d20
-
SHA256
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f
-
SHA512
b7e3805e7c184405973684e68235ab68bebcf050d70c68901d14f2c9b489baca481b956517151e42dcf59ca6d1a1348e1a33f47766f15459ce00360e59642e07
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-