General
-
Target
acda40cf6a5f5d9f1e300d2e73558586b7b9ebe87a78234cfeaa9041cd2d4763
-
Size
1.1MB
-
Sample
220625-k3kltsebfj
-
MD5
f52090bc39ae3c442706c5b4961663a1
-
SHA1
7d5882b67ee75bdf94de56ddb1e3847477b279e1
-
SHA256
acda40cf6a5f5d9f1e300d2e73558586b7b9ebe87a78234cfeaa9041cd2d4763
-
SHA512
ab9c2d8b389467e83fa2af86aeb187f1fe887af0b3c4dfba68bddacfe8a606ead01ce2f9e6fad138c1be0a992a81ded55c32cb90e0350cf7509c7c18bd3647f0
Static task
static1
Behavioral task
behavioral1
Sample
acda40cf6a5f5d9f1e300d2e73558586b7b9ebe87a78234cfeaa9041cd2d4763.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
acda40cf6a5f5d9f1e300d2e73558586b7b9ebe87a78234cfeaa9041cd2d4763.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
79.134.225.74:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n7
-
lock_executable
false
-
mutex
qvhLmKqc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
acda40cf6a5f5d9f1e300d2e73558586b7b9ebe87a78234cfeaa9041cd2d4763
-
Size
1.1MB
-
MD5
f52090bc39ae3c442706c5b4961663a1
-
SHA1
7d5882b67ee75bdf94de56ddb1e3847477b279e1
-
SHA256
acda40cf6a5f5d9f1e300d2e73558586b7b9ebe87a78234cfeaa9041cd2d4763
-
SHA512
ab9c2d8b389467e83fa2af86aeb187f1fe887af0b3c4dfba68bddacfe8a606ead01ce2f9e6fad138c1be0a992a81ded55c32cb90e0350cf7509c7c18bd3647f0
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-