General
-
Target
c67ad9e13a6d724d99a9fb69a69b7763.exe
-
Size
553KB
-
Sample
220704-j9sqcaffan
-
MD5
c67ad9e13a6d724d99a9fb69a69b7763
-
SHA1
0048692e8662bdc8b8429bfda78d108f9cc3b125
-
SHA256
167b20bea3cf481d6b08785f82ce2f07dca108e925310df2e3c44b8f662509ec
-
SHA512
94b9adfb24edf0f618da898588c8bbab3e5436be22150a15030fa60f7c5b925664b19f3e3f68e7a15f3d133e2da159a6656e9374b7c8a1e38c375ea27aa84e56
Static task
static1
Behavioral task
behavioral1
Sample
c67ad9e13a6d724d99a9fb69a69b7763.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
185.140.53.139:3367
185.140.53.139:3368
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Telkomsa@1
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
c67ad9e13a6d724d99a9fb69a69b7763.exe
-
Size
553KB
-
MD5
c67ad9e13a6d724d99a9fb69a69b7763
-
SHA1
0048692e8662bdc8b8429bfda78d108f9cc3b125
-
SHA256
167b20bea3cf481d6b08785f82ce2f07dca108e925310df2e3c44b8f662509ec
-
SHA512
94b9adfb24edf0f618da898588c8bbab3e5436be22150a15030fa60f7c5b925664b19f3e3f68e7a15f3d133e2da159a6656e9374b7c8a1e38c375ea27aa84e56
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-