General
-
Target
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
-
Size
780KB
-
Sample
220719-bp3e2sdgf5
-
MD5
24bc8e6bea3028f45e8862a845a2ee9b
-
SHA1
6d31f6ca00d355fe8dc779b377a0f1a7ce677970
-
SHA256
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
-
SHA512
2c09d97b9034f33ed57292b2e5cd546745be725f3529007b04ba70c5057433d4011be4bbd90c483b8cc11a6e0d716cbe72338b36336a796d0b72d01437300e90
Static task
static1
Behavioral task
behavioral1
Sample
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
127.0.0.1:3360
192.3.24.231:3360
-
activex_autorun
true
-
activex_key
{W41B645X-8AWL-1GUS-6R75-0DDXP4YA48S8}
-
copy_executable
true
-
delete_original
false
-
host_id
wolla
-
install_path
%AppData%\Windowsmedialites\windowsdfender.exe
-
keylogger_dir
%AppData%\Mediaupdater\
-
lock_executable
false
-
mutex
PLwAEmqL
-
offline_keylogger
true
-
password
Zynova@56070
-
registry_autorun
true
-
startup_name
windowsdfender
-
use_mutex
true
Targets
-
-
Target
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
-
Size
780KB
-
MD5
24bc8e6bea3028f45e8862a845a2ee9b
-
SHA1
6d31f6ca00d355fe8dc779b377a0f1a7ce677970
-
SHA256
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
-
SHA512
2c09d97b9034f33ed57292b2e5cd546745be725f3529007b04ba70c5057433d4011be4bbd90c483b8cc11a6e0d716cbe72338b36336a796d0b72d01437300e90
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-