General
-
Target
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568
-
Size
156KB
-
Sample
220701-drg81ahgaq
-
MD5
3086fd608ff06991a94b3f7ed891f4ef
-
SHA1
69112497cd3a29c87a5d5a657aa51f63ef34ce2c
-
SHA256
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568
-
SHA512
b810802141018bf4c970e6b747097f103ba6b7a7f4eaaa305d7d6c5f56e556fa18e8e3edbccfeb140f5250971dd7942b31a18c6ce06d7ead906d4fa2a4179521
Static task
static1
Behavioral task
behavioral1
Sample
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
79.172.242.85:1406
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
gqllpDVm
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568
-
Size
156KB
-
MD5
3086fd608ff06991a94b3f7ed891f4ef
-
SHA1
69112497cd3a29c87a5d5a657aa51f63ef34ce2c
-
SHA256
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568
-
SHA512
b810802141018bf4c970e6b747097f103ba6b7a7f4eaaa305d7d6c5f56e556fa18e8e3edbccfeb140f5250971dd7942b31a18c6ce06d7ead906d4fa2a4179521
-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-