General
-
Target
4f02875b49165e6227aba2077b27745bc397e198824a45b643993a3c7d6c79e2
-
Size
491KB
-
Sample
220720-s8lebahgf6
-
MD5
1fc09dd624c462ec94c4e14fff3d0cfc
-
SHA1
4ec944ff2255fbf6d0519daf04460c7db83e5737
-
SHA256
4f02875b49165e6227aba2077b27745bc397e198824a45b643993a3c7d6c79e2
-
SHA512
38272e663a7132dd2ae7dbf0f10a33268caacf1c2827f4e5b26b7cf79fec45226c15c333fe515772e637ef0b4ad4021be0e80f209a1257cb83adae21c376affb
Static task
static1
Behavioral task
behavioral1
Sample
4f02875b49165e6227aba2077b27745bc397e198824a45b643993a3c7d6c79e2.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
fingers1.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4f02875b49165e6227aba2077b27745bc397e198824a45b643993a3c7d6c79e2
-
Size
491KB
-
MD5
1fc09dd624c462ec94c4e14fff3d0cfc
-
SHA1
4ec944ff2255fbf6d0519daf04460c7db83e5737
-
SHA256
4f02875b49165e6227aba2077b27745bc397e198824a45b643993a3c7d6c79e2
-
SHA512
38272e663a7132dd2ae7dbf0f10a33268caacf1c2827f4e5b26b7cf79fec45226c15c333fe515772e637ef0b4ad4021be0e80f209a1257cb83adae21c376affb
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-