General
-
Target
3b15244c1ed008b43f0598786693c532480bd171a91e7cf931b6ce3a08303cc2
-
Size
1.2MB
-
Sample
220703-whdhkabaeq
-
MD5
69a49941ecabffbd265c8e8b4d0fdad0
-
SHA1
847c9d86d9747f685a18ae597796be8af721a7fc
-
SHA256
3b15244c1ed008b43f0598786693c532480bd171a91e7cf931b6ce3a08303cc2
-
SHA512
ac6380af9efc4641f76804d38f3e88d62ab4c04d7f7963eef7f1318aee51a708ac642118c05170aac089c6672e3519b061032786895e697b328cb579b8575b5d
Static task
static1
Behavioral task
behavioral1
Sample
3b15244c1ed008b43f0598786693c532480bd171a91e7cf931b6ce3a08303cc2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b15244c1ed008b43f0598786693c532480bd171a91e7cf931b6ce3a08303cc2.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
javaupdate.100chickens.biz:6988
-
activex_autorun
false
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
XubCoRQh
-
offline_keylogger
true
-
password
123
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
3b15244c1ed008b43f0598786693c532480bd171a91e7cf931b6ce3a08303cc2
-
Size
1.2MB
-
MD5
69a49941ecabffbd265c8e8b4d0fdad0
-
SHA1
847c9d86d9747f685a18ae597796be8af721a7fc
-
SHA256
3b15244c1ed008b43f0598786693c532480bd171a91e7cf931b6ce3a08303cc2
-
SHA512
ac6380af9efc4641f76804d38f3e88d62ab4c04d7f7963eef7f1318aee51a708ac642118c05170aac089c6672e3519b061032786895e697b328cb579b8575b5d
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-