General
-
Target
4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5
-
Size
653KB
-
Sample
220712-nbs1nsffcm
-
MD5
14bd022f8d3015ed27072197d179f676
-
SHA1
7cd38a3b9987c7f4e9aff01963f681cde346b8a6
-
SHA256
4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5
-
SHA512
f05a3d8b5d47b5f590822dc0beb9ad6b4830862eb10cb9eaa4c5d1405409e2ffa3fd4f4ebf6ba46ceb87ef18bf002463613246f6eb60de62c983f0b4e03223b0
Static task
static1
Behavioral task
behavioral1
Sample
4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
185.247.228.18:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
n5de2
-
lock_executable
false
-
mutex
QixvinGV
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5
-
Size
653KB
-
MD5
14bd022f8d3015ed27072197d179f676
-
SHA1
7cd38a3b9987c7f4e9aff01963f681cde346b8a6
-
SHA256
4b08cbfbaf9398c1f64aa4ab23d6197e528a3f06b513f51ac4f74dd95adbd9d5
-
SHA512
f05a3d8b5d47b5f590822dc0beb9ad6b4830862eb10cb9eaa4c5d1405409e2ffa3fd4f4ebf6ba46ceb87ef18bf002463613246f6eb60de62c983f0b4e03223b0
-
NetWire RAT payload
-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-