General
-
Target
41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577
-
Size
656KB
-
Sample
220708-ew13cabbg7
-
MD5
714bcb747c559e227f47ea71a05fb52e
-
SHA1
f8b07712e284cd4c00c555ee07482be321749a0a
-
SHA256
41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577
-
SHA512
ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569
Static task
static1
Behavioral task
behavioral1
Sample
41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577
-
Size
656KB
-
MD5
714bcb747c559e227f47ea71a05fb52e
-
SHA1
f8b07712e284cd4c00c555ee07482be321749a0a
-
SHA256
41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577
-
SHA512
ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-