General
-
Target
Confirmation invoice.exe
-
Size
985KB
-
Sample
220719-xej2lshccj
-
MD5
2858ed17f31e92fd777b63215aec5d19
-
SHA1
f943f44864f6dee7e7fc0c1e6164beb9d1aaf3f6
-
SHA256
ceddfa857ec809f2cfc3fd8168ec767f522bcb059c4448bbf662c83db8c0501c
-
SHA512
50257e958cd6b8168c152c04a1dd3ca09c94fb44c5d7e15b20e46d2432bb1ab9db4454e55188fc0b84bd1de83976e3785ef29dd7d0edec3a0bf74155a5dabd53
Static task
static1
Behavioral task
behavioral1
Sample
Confirmation invoice.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
185.140.53.61:3363
185.140.53.61:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Confirmation invoice.exe
-
Size
985KB
-
MD5
2858ed17f31e92fd777b63215aec5d19
-
SHA1
f943f44864f6dee7e7fc0c1e6164beb9d1aaf3f6
-
SHA256
ceddfa857ec809f2cfc3fd8168ec767f522bcb059c4448bbf662c83db8c0501c
-
SHA512
50257e958cd6b8168c152c04a1dd3ca09c94fb44c5d7e15b20e46d2432bb1ab9db4454e55188fc0b84bd1de83976e3785ef29dd7d0edec3a0bf74155a5dabd53
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-