General
-
Target
500808c33b37f95c8cddbce21d8a69bbbc2270a78c9771df69435cdd80794ad4
-
Size
584KB
-
Sample
220719-rsfnfsfaan
-
MD5
8e1d1a09e94f30ec964448c915101d2b
-
SHA1
c85d5abb51639c3fddd927978c0e5277b5fb941e
-
SHA256
500808c33b37f95c8cddbce21d8a69bbbc2270a78c9771df69435cdd80794ad4
-
SHA512
00d53510186d9009548c83a64d2e5a759df2a9a255919aff8049346903fba5289a6c912274d2e9e08e4e78fc9e0deda3bbaceebe116f369a6cf711ddb7f99ab2
Static task
static1
Behavioral task
behavioral1
Sample
500808c33b37f95c8cddbce21d8a69bbbc2270a78c9771df69435cdd80794ad4.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
500808c33b37f95c8cddbce21d8a69bbbc2270a78c9771df69435cdd80794ad4.exe
Resource
win10v2004-20220718-en
Malware Config
Extracted
netwire
moremoney001.ddns.net:1759
10.219.79.74:1616
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
yankee
-
install_path
%AppData%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HsAMvvOf
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
500808c33b37f95c8cddbce21d8a69bbbc2270a78c9771df69435cdd80794ad4
-
Size
584KB
-
MD5
8e1d1a09e94f30ec964448c915101d2b
-
SHA1
c85d5abb51639c3fddd927978c0e5277b5fb941e
-
SHA256
500808c33b37f95c8cddbce21d8a69bbbc2270a78c9771df69435cdd80794ad4
-
SHA512
00d53510186d9009548c83a64d2e5a759df2a9a255919aff8049346903fba5289a6c912274d2e9e08e4e78fc9e0deda3bbaceebe116f369a6cf711ddb7f99ab2
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-