General
-
Target
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4
-
Size
764KB
-
Sample
220701-ev4f3sddh4
-
MD5
c8ad3f500f51ba6f32971496d3fd605e
-
SHA1
0677951661b11e2fc5f35e9f5e1ed8d964b8ab79
-
SHA256
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4
-
SHA512
c9a6bb7ca9162d7bdb61ffe332fc09388eb1f24d4bd203363aa35b308e0416d4328a228ef9a578ad2176385dc37668df0ed039104917dd0e7f9a9329626fe350
Static task
static1
Behavioral task
behavioral1
Sample
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4
-
Size
764KB
-
MD5
c8ad3f500f51ba6f32971496d3fd605e
-
SHA1
0677951661b11e2fc5f35e9f5e1ed8d964b8ab79
-
SHA256
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4
-
SHA512
c9a6bb7ca9162d7bdb61ffe332fc09388eb1f24d4bd203363aa35b308e0416d4328a228ef9a578ad2176385dc37668df0ed039104917dd0e7f9a9329626fe350
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-