General
-
Target
38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a
-
Size
351KB
-
Sample
220625-yxm2naceb3
-
MD5
c6880d3f845a57d080145d53a6ac58e3
-
SHA1
cca382986b9969b6b2e4210655f5e71b001964bf
-
SHA256
38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a
-
SHA512
d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec
Static task
static1
Behavioral task
behavioral1
Sample
38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
ASKJHDASKDHSHTD.RU:6971
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
mutex
mqIhDWwE
-
offline_keylogger
false
-
password
ppF7"oRyqm
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a
-
Size
351KB
-
MD5
c6880d3f845a57d080145d53a6ac58e3
-
SHA1
cca382986b9969b6b2e4210655f5e71b001964bf
-
SHA256
38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a
-
SHA512
d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-