General
-
Target
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a
-
Size
1.2MB
-
Sample
220714-acpgzschfr
-
MD5
87c6e46715878db1236b4d02ed40b1b2
-
SHA1
3554b9a38df7f61ece5292a6dd7ba1d13733f2ad
-
SHA256
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a
-
SHA512
6c6d43dadd24f251385efb04e10e4be390c6bbed6e9168e052b2e2afe0644482117b514f1d1e940ccc99141ad59bb9104d10352ce1b7cdbf841cdb5346742a69
Static task
static1
Behavioral task
behavioral1
Sample
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a
-
Size
1.2MB
-
MD5
87c6e46715878db1236b4d02ed40b1b2
-
SHA1
3554b9a38df7f61ece5292a6dd7ba1d13733f2ad
-
SHA256
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a
-
SHA512
6c6d43dadd24f251385efb04e10e4be390c6bbed6e9168e052b2e2afe0644482117b514f1d1e940ccc99141ad59bb9104d10352ce1b7cdbf841cdb5346742a69
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-