General
-
Target
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
-
Size
1.2MB
-
Sample
220708-r9ht5sghd4
-
MD5
f22c7168d2c41964a1dfbf99904a2843
-
SHA1
274337d271c26d63c9d36cd89a53456941d6f1df
-
SHA256
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
-
SHA512
8110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb
Static task
static1
Behavioral task
behavioral1
Sample
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
95.167.151.235:8973
-
activex_autorun
true
-
activex_key
{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Targets
-
-
Target
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
-
Size
1.2MB
-
MD5
f22c7168d2c41964a1dfbf99904a2843
-
SHA1
274337d271c26d63c9d36cd89a53456941d6f1df
-
SHA256
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
-
SHA512
8110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Drops startup file
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-