General
-
Target
Payment Receipt.exe
-
Size
684KB
-
Sample
220707-wj5y7sfgd8
-
MD5
e3ad7486fa3ae740817bb03e35b39f15
-
SHA1
1d234c723e21fa33fa891aeb683ab8689d5437f6
-
SHA256
81a3622df2a114ee18f9f869fcaadb38d0cc21f2abed2cad7a5b41acb5a084ee
-
SHA512
198f03036eeff65ac14c81901fa13ebc1a1b4277e34c2653d748d207d173bf5eea39e514ba16f447022e2a4a47544982c14e29d14c359b75cc808c3f5992e822
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
185.140.53.61:3363
185.140.53.61:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-aic6O4
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Payment Receipt.exe
-
Size
684KB
-
MD5
e3ad7486fa3ae740817bb03e35b39f15
-
SHA1
1d234c723e21fa33fa891aeb683ab8689d5437f6
-
SHA256
81a3622df2a114ee18f9f869fcaadb38d0cc21f2abed2cad7a5b41acb5a084ee
-
SHA512
198f03036eeff65ac14c81901fa13ebc1a1b4277e34c2653d748d207d173bf5eea39e514ba16f447022e2a4a47544982c14e29d14c359b75cc808c3f5992e822
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-