General
-
Target
4a157f302bd6afd4079720dbc7028a8caae9b2d2b192ee4f4a6915dec94cd5af
-
Size
648KB
-
Sample
220712-r1efcshaf8
-
MD5
7c958c25fd6e816da044bcd23f37940a
-
SHA1
e95cf0c3d58448cf0e9ff8b53ca6ecff10a81246
-
SHA256
4a157f302bd6afd4079720dbc7028a8caae9b2d2b192ee4f4a6915dec94cd5af
-
SHA512
08f22b747697c3060f14834c321203c7eacdbe1f053dbe3044a3810a030ba9da26746b64d3ed956741fa5465c868b0d00d692c89a2538d038d973fb43a072724
Static task
static1
Behavioral task
behavioral1
Sample
4a157f302bd6afd4079720dbc7028a8caae9b2d2b192ee4f4a6915dec94cd5af.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4a157f302bd6afd4079720dbc7028a8caae9b2d2b192ee4f4a6915dec94cd5af.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
ggggg.ddns.net:3360
boow.ddns.net:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
OnVjhkkv
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
4a157f302bd6afd4079720dbc7028a8caae9b2d2b192ee4f4a6915dec94cd5af
-
Size
648KB
-
MD5
7c958c25fd6e816da044bcd23f37940a
-
SHA1
e95cf0c3d58448cf0e9ff8b53ca6ecff10a81246
-
SHA256
4a157f302bd6afd4079720dbc7028a8caae9b2d2b192ee4f4a6915dec94cd5af
-
SHA512
08f22b747697c3060f14834c321203c7eacdbe1f053dbe3044a3810a030ba9da26746b64d3ed956741fa5465c868b0d00d692c89a2538d038d973fb43a072724
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-