General
-
Target
RO11039484.exe
-
Size
814KB
-
Sample
220714-hbtz3sdcg8
-
MD5
0ad0c3b353974a1ca9fc7343bd53c89c
-
SHA1
17432c1edf7183f5c6567502b2ae7b5e188fc3db
-
SHA256
9e5791d56ab1616fd28086994b3b2acc5b6f4af9c1ebfd78966a56fcc2780635
-
SHA512
f80ffe2eafc868ab80d143baf292063bb13f4b6ee0cee889624ef49edde42a5601ace81ee8f5e85d06dffc882521be592999270b694cd3fa5523aef5f32a843d
Static task
static1
Behavioral task
behavioral1
Sample
RO11039484.exe
Resource
win7-20220414-en
Malware Config
Extracted
netwire
xman2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
RO11039484.exe
-
Size
814KB
-
MD5
0ad0c3b353974a1ca9fc7343bd53c89c
-
SHA1
17432c1edf7183f5c6567502b2ae7b5e188fc3db
-
SHA256
9e5791d56ab1616fd28086994b3b2acc5b6f4af9c1ebfd78966a56fcc2780635
-
SHA512
f80ffe2eafc868ab80d143baf292063bb13f4b6ee0cee889624ef49edde42a5601ace81ee8f5e85d06dffc882521be592999270b694cd3fa5523aef5f32a843d
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-