General
-
Target
SVR00398488.exe
-
Size
1.0MB
-
Sample
220714-g96absabhl
-
MD5
04659d9e2d0a05eea8e6148f9f2627e8
-
SHA1
6df8c86fc1932ead13d8510b0951220086145438
-
SHA256
5c5a3dbeaef130404f996ff4e45c7ff0c9d8cd95b2071338d51af7437f675531
-
SHA512
525379196c75efefa68796a57b25beabd69bc4bdabe05aaaee3bcba9a548a5dd372e5000494a0dd7fed8f14891345817c5c4f1be1ee52e1b5a2f9c8f803684a7
Static task
static1
Behavioral task
behavioral1
Sample
SVR00398488.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
xman2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
SVR00398488.exe
-
Size
1.0MB
-
MD5
04659d9e2d0a05eea8e6148f9f2627e8
-
SHA1
6df8c86fc1932ead13d8510b0951220086145438
-
SHA256
5c5a3dbeaef130404f996ff4e45c7ff0c9d8cd95b2071338d51af7437f675531
-
SHA512
525379196c75efefa68796a57b25beabd69bc4bdabe05aaaee3bcba9a548a5dd372e5000494a0dd7fed8f14891345817c5c4f1be1ee52e1b5a2f9c8f803684a7
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-