General
-
Target
412e4f6cdf3aec4b28a107e6f7f01f9365bebe0b39e052b10537b2ea28c1340f
-
Size
540KB
-
Sample
220708-hblzgafde2
-
MD5
e908270ed1cad4b5f2081c90ec972b13
-
SHA1
aa3a11069ef6f4d765c4f9fd54405434b554660b
-
SHA256
412e4f6cdf3aec4b28a107e6f7f01f9365bebe0b39e052b10537b2ea28c1340f
-
SHA512
ef8b4d3560bff36d34a274c4489cf000229421336d367a08c7d6423ec7195800752582091b7049fe9c4d088f9751e55e3158e6839ce593a2dc47521e739da3be
Static task
static1
Behavioral task
behavioral1
Sample
412e4f6cdf3aec4b28a107e6f7f01f9365bebe0b39e052b10537b2ea28c1340f.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
160.116.15.145:9921
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
412e4f6cdf3aec4b28a107e6f7f01f9365bebe0b39e052b10537b2ea28c1340f
-
Size
540KB
-
MD5
e908270ed1cad4b5f2081c90ec972b13
-
SHA1
aa3a11069ef6f4d765c4f9fd54405434b554660b
-
SHA256
412e4f6cdf3aec4b28a107e6f7f01f9365bebe0b39e052b10537b2ea28c1340f
-
SHA512
ef8b4d3560bff36d34a274c4489cf000229421336d367a08c7d6423ec7195800752582091b7049fe9c4d088f9751e55e3158e6839ce593a2dc47521e739da3be
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-