General
-
Target
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b
-
Size
632KB
-
Sample
220707-vjzxhsbggj
-
MD5
103103bcf0df850da224b5ec97ef91e9
-
SHA1
cf9a21010fc1bc58da283626e85c2e375d37483c
-
SHA256
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b
-
SHA512
d2f34f4debb92b176b581e31b420cf7e0478db3ca6fe47b48fa80213c849d574afca4f16d7598bdd057d04bfc453e4aeb694c2023c8377b295985f439774df6a
Static task
static1
Behavioral task
behavioral1
Sample
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
xmpphosts.ru:3367
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
mutex
oOdvssQB
-
offline_keylogger
false
-
password
456123xyz
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b
-
Size
632KB
-
MD5
103103bcf0df850da224b5ec97ef91e9
-
SHA1
cf9a21010fc1bc58da283626e85c2e375d37483c
-
SHA256
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b
-
SHA512
d2f34f4debb92b176b581e31b420cf7e0478db3ca6fe47b48fa80213c849d574afca4f16d7598bdd057d04bfc453e4aeb694c2023c8377b295985f439774df6a
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-