General
-
Target
0096d73eafc106724bac02d3fa23458d6f0c5d2f233cef348a73b3f157be8e0e
-
Size
2.6MB
-
Sample
220708-stx5kaaah5
-
MD5
c61b4229f2a9e1d05569736a4faf29d1
-
SHA1
2e1207d54b55dd7aad206b2722696b1b07953e64
-
SHA256
0096d73eafc106724bac02d3fa23458d6f0c5d2f233cef348a73b3f157be8e0e
-
SHA512
9bffa6b6afefa1f9c40c19b5e89803ce0be56ea92dd8c6f585f9275a998e6c71a9f08b8604f6885ce02aea2c471dd10ff0c6eb6a8ddb49188aec9e99b99f7a0c
Static task
static1
Behavioral task
behavioral1
Sample
0096d73eafc106724bac02d3fa23458d6f0c5d2f233cef348a73b3f157be8e0e.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
haija.mine.nu:1338
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Data Encoder
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
0096d73eafc106724bac02d3fa23458d6f0c5d2f233cef348a73b3f157be8e0e
-
Size
2.6MB
-
MD5
c61b4229f2a9e1d05569736a4faf29d1
-
SHA1
2e1207d54b55dd7aad206b2722696b1b07953e64
-
SHA256
0096d73eafc106724bac02d3fa23458d6f0c5d2f233cef348a73b3f157be8e0e
-
SHA512
9bffa6b6afefa1f9c40c19b5e89803ce0be56ea92dd8c6f585f9275a998e6c71a9f08b8604f6885ce02aea2c471dd10ff0c6eb6a8ddb49188aec9e99b99f7a0c
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
Turns off Windows Defender SpyNet reporting
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-