General
-
Target
4abc64c563b11340e0023040be3b9138f275a3c2fda55cfa9b36f70b1216ac79
-
Size
520KB
-
Sample
220712-pgpqwahgcm
-
MD5
2298d699156317e16e5e15c1e574642d
-
SHA1
2fee660488a31556b676b8153c5e472976f021fd
-
SHA256
4abc64c563b11340e0023040be3b9138f275a3c2fda55cfa9b36f70b1216ac79
-
SHA512
27759500d9fc47ad4c7dbc5b45fb1a6d15af1adf039bd8600533d5593a0687a52e06c5c6d546aac5f9144d874b5cd1b3bbe5eba18553ff683c839ad39935d9c3
Static task
static1
Behavioral task
behavioral1
Sample
4abc64c563b11340e0023040be3b9138f275a3c2fda55cfa9b36f70b1216ac79.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4abc64c563b11340e0023040be3b9138f275a3c2fda55cfa9b36f70b1216ac79.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
missserver1000.hopto.org:8309
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4abc64c563b11340e0023040be3b9138f275a3c2fda55cfa9b36f70b1216ac79
-
Size
520KB
-
MD5
2298d699156317e16e5e15c1e574642d
-
SHA1
2fee660488a31556b676b8153c5e472976f021fd
-
SHA256
4abc64c563b11340e0023040be3b9138f275a3c2fda55cfa9b36f70b1216ac79
-
SHA512
27759500d9fc47ad4c7dbc5b45fb1a6d15af1adf039bd8600533d5593a0687a52e06c5c6d546aac5f9144d874b5cd1b3bbe5eba18553ff683c839ad39935d9c3
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
NetWire RAT payload
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-