General
-
Target
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
-
Size
740KB
-
Sample
220718-z4wg2shcd9
-
MD5
a1b23f02659dab7b195e78a08d5847ca
-
SHA1
8a51e9c00629ded57754e400d6344c018ab0183a
-
SHA256
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
-
SHA512
227b9753bda1d150b287fc4da824416e266aadc35212a037eb4665cb9895c267c07fc3be3505039136832a08c93ac03ea28b7a22e3ba7a0a1f94f052a4a99d05
Static task
static1
Behavioral task
behavioral1
Sample
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe
Resource
win10v2004-20220718-en
Malware Config
Extracted
netwire
amz1.hackermind.info:3360
-
activex_autorun
true
-
activex_key
{O5IC1RX5-17QA-4B21-K563-M1NR4O07C3VQ}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
-
Size
740KB
-
MD5
a1b23f02659dab7b195e78a08d5847ca
-
SHA1
8a51e9c00629ded57754e400d6344c018ab0183a
-
SHA256
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
-
SHA512
227b9753bda1d150b287fc4da824416e266aadc35212a037eb4665cb9895c267c07fc3be3505039136832a08c93ac03ea28b7a22e3ba7a0a1f94f052a4a99d05
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-