General
-
Target
f4538fc39c627a098bdc55331db0bd1661c2257b061bb3783ed1c7cc55afdb7d
-
Size
105KB
-
Sample
220701-h22slshddl
-
MD5
e41a15ffc2f84d3322f9cc3cf8b101ad
-
SHA1
616719ba3558c03eea84d011abd2e04b1f592bb8
-
SHA256
f4538fc39c627a098bdc55331db0bd1661c2257b061bb3783ed1c7cc55afdb7d
-
SHA512
53ad95d5352d42ae6a6f57485770dba3d20067403367da4f3f0203a37902aa5b2eb8b28a835e1f60c694f520fa728229f9a83c8095c430fbd2d0e5f13367a783
Behavioral task
behavioral1
Sample
f4538fc39c627a098bdc55331db0bd1661c2257b061bb3783ed1c7cc55afdb7d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f4538fc39c627a098bdc55331db0bd1661c2257b061bb3783ed1c7cc55afdb7d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
akachi07.mmafan.biz:8757
-
activex_autorun
true
-
activex_key
{2KYFY1VI-7E18-DV7K-3B2P-6SQAJ3II7S61}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Neq app
-
use_mutex
false
Targets
-
-
Target
f4538fc39c627a098bdc55331db0bd1661c2257b061bb3783ed1c7cc55afdb7d
-
Size
105KB
-
MD5
e41a15ffc2f84d3322f9cc3cf8b101ad
-
SHA1
616719ba3558c03eea84d011abd2e04b1f592bb8
-
SHA256
f4538fc39c627a098bdc55331db0bd1661c2257b061bb3783ed1c7cc55afdb7d
-
SHA512
53ad95d5352d42ae6a6f57485770dba3d20067403367da4f3f0203a37902aa5b2eb8b28a835e1f60c694f520fa728229f9a83c8095c430fbd2d0e5f13367a783
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-