General
-
Target
76dda78693e017f2115b698b091a35c98a7c886144da10ec67468ffa9b0fa1f8
-
Size
622KB
-
Sample
220701-dj5dkahdcq
-
MD5
a0abf6f3d37b89d95d28f8b8dab955e6
-
SHA1
e70d71f9fd000fde5cbf030d75c4c8eae96cadbf
-
SHA256
76dda78693e017f2115b698b091a35c98a7c886144da10ec67468ffa9b0fa1f8
-
SHA512
bc781c56db8ad51904b2f2129c1070668611dc8de315c82298616021cb2d860d73d842b06b6f9a3e1d4633ff195acc24d05591bc24cfa5db9893226a5bb70c50
Static task
static1
Behavioral task
behavioral1
Sample
76dda78693e017f2115b698b091a35c98a7c886144da10ec67468ffa9b0fa1f8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
76dda78693e017f2115b698b091a35c98a7c886144da10ec67468ffa9b0fa1f8.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
top.eaglee1.xyz:4376
-
activex_autorun
true
-
activex_key
{S1A7F3VV-OW16-1770-3W1J-83E0NN856S32}
-
copy_executable
true
-
delete_original
true
-
host_id
USA
-
install_path
%AppData%\Install\Mswords.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
WRsslUuw
-
offline_keylogger
true
-
password
<(/82?TM{V
-
registry_autorun
true
-
startup_name
Mswords
-
use_mutex
true
Targets
-
-
Target
76dda78693e017f2115b698b091a35c98a7c886144da10ec67468ffa9b0fa1f8
-
Size
622KB
-
MD5
a0abf6f3d37b89d95d28f8b8dab955e6
-
SHA1
e70d71f9fd000fde5cbf030d75c4c8eae96cadbf
-
SHA256
76dda78693e017f2115b698b091a35c98a7c886144da10ec67468ffa9b0fa1f8
-
SHA512
bc781c56db8ad51904b2f2129c1070668611dc8de315c82298616021cb2d860d73d842b06b6f9a3e1d4633ff195acc24d05591bc24cfa5db9893226a5bb70c50
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-