General
-
Target
52a931d26a5c731d659d4ff5321b9c3b4a135f4944cd46e6f9821d608a71add3
-
Size
1.2MB
-
Sample
220717-cr7yzscab7
-
MD5
7f33d4d920c55535fb224546b3cb94bd
-
SHA1
004126cdbcecef4dc334d6ca352b719e74366248
-
SHA256
52a931d26a5c731d659d4ff5321b9c3b4a135f4944cd46e6f9821d608a71add3
-
SHA512
fb48b29d8d0752d66f421b9c0c3ca672c72aa96b7ba5da636462d6993a8a6041d0cdc09b34563d52e9c56453baf3271e2508979059680d2c18e1365c9736fad3
Static task
static1
Behavioral task
behavioral1
Sample
52a931d26a5c731d659d4ff5321b9c3b4a135f4944cd46e6f9821d608a71add3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
52a931d26a5c731d659d4ff5321b9c3b4a135f4944cd46e6f9821d608a71add3.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
profoundation.linkpc.net:3595
-
activex_autorun
true
-
activex_key
{E1677N83-AN77-01LA-0WK8-46188A3TY05U}
-
copy_executable
true
-
delete_original
false
-
host_id
HOPE - HOPE
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
YYODCdsO
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
52a931d26a5c731d659d4ff5321b9c3b4a135f4944cd46e6f9821d608a71add3
-
Size
1.2MB
-
MD5
7f33d4d920c55535fb224546b3cb94bd
-
SHA1
004126cdbcecef4dc334d6ca352b719e74366248
-
SHA256
52a931d26a5c731d659d4ff5321b9c3b4a135f4944cd46e6f9821d608a71add3
-
SHA512
fb48b29d8d0752d66f421b9c0c3ca672c72aa96b7ba5da636462d6993a8a6041d0cdc09b34563d52e9c56453baf3271e2508979059680d2c18e1365c9736fad3
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-