General
-
Target
3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4
-
Size
226KB
-
Sample
220630-ycz6gscad2
-
MD5
aaba0aeb767328afc2bbb76bfbb19297
-
SHA1
8ba930891e1c8834303ebbdf2261703f5050e9f7
-
SHA256
3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4
-
SHA512
b5f3395cdacdf6c4b42976c016711fa162ccf56f86f1402d1b7c82d011297e99824208b4d6bf96eeda82b864542c4e2c0a93a684fdab43b85656a39b2f0d4390
Static task
static1
Behavioral task
behavioral1
Sample
3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
genlast.giize.com:1604
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4
-
Size
226KB
-
MD5
aaba0aeb767328afc2bbb76bfbb19297
-
SHA1
8ba930891e1c8834303ebbdf2261703f5050e9f7
-
SHA256
3412783f631651f6a1fa26aa89a68728d03076caf467afb20e822c20d9689ce4
-
SHA512
b5f3395cdacdf6c4b42976c016711fa162ccf56f86f1402d1b7c82d011297e99824208b4d6bf96eeda82b864542c4e2c0a93a684fdab43b85656a39b2f0d4390
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-