General
-
Target
47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca
-
Size
790KB
-
Sample
220625-nexg9saagk
-
MD5
83cb754727db76ae43478657504a9919
-
SHA1
338cff0ee0001a48ced70ca80f5985c33cef1312
-
SHA256
47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca
-
SHA512
710936a25692f192f7a5ef76e791049fce45887535fe931ae8a730ea96e79d2beba5f3b4bef83e2a424a079eab2a7ea217e129c689a8e9202a6ff670241c2844
Static task
static1
Behavioral task
behavioral1
Sample
47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
185.140.53.61:39469
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
MMC
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\Imgburn\
-
lock_executable
false
-
mutex
BdYNVjOs
-
offline_keylogger
true
-
password
Favor1000$
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca
-
Size
790KB
-
MD5
83cb754727db76ae43478657504a9919
-
SHA1
338cff0ee0001a48ced70ca80f5985c33cef1312
-
SHA256
47ab55e27bd4dc2bfff7a5ee62e1a0e9caad4307e7cb5bdde27fb9305c1825ca
-
SHA512
710936a25692f192f7a5ef76e791049fce45887535fe931ae8a730ea96e79d2beba5f3b4bef83e2a424a079eab2a7ea217e129c689a8e9202a6ff670241c2844
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-