General
-
Target
4114804fd7aebc04caec60731b3282998cca1e276e5f120dce88d46decff1895
-
Size
303KB
-
Sample
220708-hrn4rsgcc9
-
MD5
144539a65d10a6ed3df334866028ba79
-
SHA1
7d74cbaa4552b9468aaf079dab28b2bae29d1ae9
-
SHA256
4114804fd7aebc04caec60731b3282998cca1e276e5f120dce88d46decff1895
-
SHA512
33802b04f713820d4a19220b3391cde8090a3837a82fff2d23af4d8994998665d87c98195170f68b6856c58d765b96bfd64fa7163ee1cf3882416cb5de8c58e9
Static task
static1
Behavioral task
behavioral1
Sample
4114804fd7aebc04caec60731b3282998cca1e276e5f120dce88d46decff1895.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4114804fd7aebc04caec60731b3282998cca1e276e5f120dce88d46decff1895.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
info1.nowddns.com:5552
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
NOW-DNS-5552
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
gqmQdKHu
-
offline_keylogger
true
-
password
caster123
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
4114804fd7aebc04caec60731b3282998cca1e276e5f120dce88d46decff1895
-
Size
303KB
-
MD5
144539a65d10a6ed3df334866028ba79
-
SHA1
7d74cbaa4552b9468aaf079dab28b2bae29d1ae9
-
SHA256
4114804fd7aebc04caec60731b3282998cca1e276e5f120dce88d46decff1895
-
SHA512
33802b04f713820d4a19220b3391cde8090a3837a82fff2d23af4d8994998665d87c98195170f68b6856c58d765b96bfd64fa7163ee1cf3882416cb5de8c58e9
-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-