General
-
Target
New Trial Order CSI94950949349pdf.exe
-
Size
584KB
-
Sample
220720-pjbl2affcl
-
MD5
6c1466f2e02bff6394c42e9f9a79b872
-
SHA1
b691a323fa4ebea73aa728fa979be437e226eeb1
-
SHA256
94c157980ea71c70134696ab3a285ac9668546370e9503433c5aa11df45ed15b
-
SHA512
9252adaa812f85442e8c5f990406446c15cd4d4f16749ee9876dd4408e8f5930e78d9b85552b7cffce2969efea640fc23daac348b2bc53fe33aaa26af2ecb223
Static task
static1
Behavioral task
behavioral1
Sample
New Trial Order CSI94950949349pdf.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
sani990.duckdns.org:5631
admin96.hopto.org:5631
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
THE SAINT
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
hPSXRboY
-
offline_keylogger
true
-
password
teamoluwa1
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
New Trial Order CSI94950949349pdf.exe
-
Size
584KB
-
MD5
6c1466f2e02bff6394c42e9f9a79b872
-
SHA1
b691a323fa4ebea73aa728fa979be437e226eeb1
-
SHA256
94c157980ea71c70134696ab3a285ac9668546370e9503433c5aa11df45ed15b
-
SHA512
9252adaa812f85442e8c5f990406446c15cd4d4f16749ee9876dd4408e8f5930e78d9b85552b7cffce2969efea640fc23daac348b2bc53fe33aaa26af2ecb223
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-