General
-
Target
3e6dcfee362cc64f822997faef027faad714381f71be9960fcc096f8cfc2fb57
-
Size
404KB
-
Sample
220701-jal4hsbdg6
-
MD5
0ad9a73872803f10601b98c7b3a84a83
-
SHA1
41453bef0e01fc56672fc140e8a35101b0bad819
-
SHA256
3e6dcfee362cc64f822997faef027faad714381f71be9960fcc096f8cfc2fb57
-
SHA512
f2195e161085e3bff72663e615fe747bf29dde57dbc8e67c4d987225a50b2043be8c719715d3460a0463bfd5a0e77455e2432b452ff8967eaf87e16e7b9d7f0d
Static task
static1
Behavioral task
behavioral1
Sample
3e6dcfee362cc64f822997faef027faad714381f71be9960fcc096f8cfc2fb57.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e6dcfee362cc64f822997faef027faad714381f71be9960fcc096f8cfc2fb57.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
mlhdns.phatbois.me:4772
mlhdns.pandabearsunited.xyz:4772
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
3e6dcfee362cc64f822997faef027faad714381f71be9960fcc096f8cfc2fb57
-
Size
404KB
-
MD5
0ad9a73872803f10601b98c7b3a84a83
-
SHA1
41453bef0e01fc56672fc140e8a35101b0bad819
-
SHA256
3e6dcfee362cc64f822997faef027faad714381f71be9960fcc096f8cfc2fb57
-
SHA512
f2195e161085e3bff72663e615fe747bf29dde57dbc8e67c4d987225a50b2043be8c719715d3460a0463bfd5a0e77455e2432b452ff8967eaf87e16e7b9d7f0d
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-