General
-
Target
4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666
-
Size
414KB
-
Sample
220719-1p2aesfadk
-
MD5
9c0951fb8402c355e783fa534450e119
-
SHA1
95fd8fab4bb4fd644b1b5e21daa8fc8325702d4b
-
SHA256
4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666
-
SHA512
009ba5b31647471474cfe4e9859415f56fc48db902480a7e370ccd47d4dad870c92378b4dbb5ac2bc6353e63bc7f15afc768a386fa529a5cee5a7269257c6361
Static task
static1
Behavioral task
behavioral1
Sample
4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
profoundation.linkpc.net:3595
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Luli
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
iSoBgOVE
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666
-
Size
414KB
-
MD5
9c0951fb8402c355e783fa534450e119
-
SHA1
95fd8fab4bb4fd644b1b5e21daa8fc8325702d4b
-
SHA256
4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666
-
SHA512
009ba5b31647471474cfe4e9859415f56fc48db902480a7e370ccd47d4dad870c92378b4dbb5ac2bc6353e63bc7f15afc768a386fa529a5cee5a7269257c6361
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-