General
-
Target
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
-
Size
615KB
-
Sample
220701-rnsr8ahea2
-
MD5
9df25a599697716759c0183e3284f8aa
-
SHA1
405af3516b660318f006c16b2829adf0ec8e7d14
-
SHA256
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
-
SHA512
e13a74ee635eea2c77ed1e4b7b8074de3f87e530a20ee1ec3763933e915621adcdf3c057d6b5e19e80d1ffed776482a47b08e4b996d2f6f0c981fac86e109f27
Static task
static1
Behavioral task
behavioral1
Sample
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
79.134.225.94:7119
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
New order
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
-
Size
615KB
-
MD5
9df25a599697716759c0183e3284f8aa
-
SHA1
405af3516b660318f006c16b2829adf0ec8e7d14
-
SHA256
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
-
SHA512
e13a74ee635eea2c77ed1e4b7b8074de3f87e530a20ee1ec3763933e915621adcdf3c057d6b5e19e80d1ffed776482a47b08e4b996d2f6f0c981fac86e109f27
-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-