General
-
Target
50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301
-
Size
182KB
-
Sample
220718-yzgyesggbm
-
MD5
67e4fd83de43eaf93e7c9faf77c36f78
-
SHA1
bbeddca7949e44d92a6207a31a29f41cca462ba0
-
SHA256
50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301
-
SHA512
42684195a35b81fb1b4f6d8266a9568c768b3c0c64ef660cf9807bff2d0c853ab8755e7f7e79135c67ebb37c253e9e104218de97e86431d380ff1321d497ce62
Static task
static1
Behavioral task
behavioral1
Sample
50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
fingers1.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301
-
Size
182KB
-
MD5
67e4fd83de43eaf93e7c9faf77c36f78
-
SHA1
bbeddca7949e44d92a6207a31a29f41cca462ba0
-
SHA256
50cc4cd83fa92569a30723236b3c68320fd1bdb90b1dd3e4a162817200849301
-
SHA512
42684195a35b81fb1b4f6d8266a9568c768b3c0c64ef660cf9807bff2d0c853ab8755e7f7e79135c67ebb37c253e9e104218de97e86431d380ff1321d497ce62
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-