General
-
Target
9341801725d240ac01b4b616dd71060f848597249a32629c2c3f430a96643ad4
-
Size
1.1MB
-
Sample
220625-v5qwqsdffj
-
MD5
526cf3ff90e65fa4f7fabd5ddc27782e
-
SHA1
487b584ded91d92b6bc81eb1493524c8777f0c4c
-
SHA256
9341801725d240ac01b4b616dd71060f848597249a32629c2c3f430a96643ad4
-
SHA512
372a2b627be46b5afecd2ed0f5d5cbe0a4a5c704d0968a67fd8c97c5848e0cc0fc64ccec9f2d7488158cb7d0531021bb2f33ce3155b313d667835e631549490f
Static task
static1
Behavioral task
behavioral1
Sample
9341801725d240ac01b4b616dd71060f848597249a32629c2c3f430a96643ad4.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
9341801725d240ac01b4b616dd71060f848597249a32629c2c3f430a96643ad4
-
Size
1.1MB
-
MD5
526cf3ff90e65fa4f7fabd5ddc27782e
-
SHA1
487b584ded91d92b6bc81eb1493524c8777f0c4c
-
SHA256
9341801725d240ac01b4b616dd71060f848597249a32629c2c3f430a96643ad4
-
SHA512
372a2b627be46b5afecd2ed0f5d5cbe0a4a5c704d0968a67fd8c97c5848e0cc0fc64ccec9f2d7488158cb7d0531021bb2f33ce3155b313d667835e631549490f
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-