General
-
Target
Proof of Payment.doc
-
Size
230KB
-
Sample
220715-n2vxysbden
-
MD5
ccb4d123d7d23778dc3b804f8b4c551a
-
SHA1
6abaeacc98255a7a8048f0a62a7b983720c904da
-
SHA256
c4155eb3caee31efbcf7672f25c39e875b81bba26400cf0c4d4840e534491122
-
SHA512
0ae4ac069b843d2bb45064a29fed582970d15621135ef5b584f10d7aee6be71a049085f317161eb3980cc05efcd65d1c3aefb98c3bd1a1139286d03934367cca
Static task
static1
Behavioral task
behavioral1
Sample
Proof of Payment.rtf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Proof of Payment.rtf
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://192.3.194.246/new.exe
Extracted
netwire
194.5.98.188:3364
194.5.98.188:3366
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
j5m52xuc
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Proof of Payment.doc
-
Size
230KB
-
MD5
ccb4d123d7d23778dc3b804f8b4c551a
-
SHA1
6abaeacc98255a7a8048f0a62a7b983720c904da
-
SHA256
c4155eb3caee31efbcf7672f25c39e875b81bba26400cf0c4d4840e534491122
-
SHA512
0ae4ac069b843d2bb45064a29fed582970d15621135ef5b584f10d7aee6be71a049085f317161eb3980cc05efcd65d1c3aefb98c3bd1a1139286d03934367cca
-
NetWire RAT payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-