General
-
Target
4ef520b5bbc4521edc2b600918eac72d04608600a8ec295df06db5c9ed3a5e13
-
Size
1.7MB
-
Sample
220720-tedcaaafal
-
MD5
eac50aecd140f50a9b05bd1d7ead0895
-
SHA1
605890b47e3f232196ff9e21ca983a91278f8c1e
-
SHA256
4ef520b5bbc4521edc2b600918eac72d04608600a8ec295df06db5c9ed3a5e13
-
SHA512
eedb9a7ac6465476ba6d62bb2bb5ef5c97fd733bd83a6956d36d087239a8de5d11e020caa14b88723b91979bc39eeac0398c0180f32f452e598465bf5ab82e49
Static task
static1
Behavioral task
behavioral1
Sample
4ef520b5bbc4521edc2b600918eac72d04608600a8ec295df06db5c9ed3a5e13.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
216.38.2.197:6080
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
FEB2K19
-
install_path
%AppData%\Install\Wordpads.exe
-
keylogger_dir
%AppData%\sgol\
-
lock_executable
false
-
offline_keylogger
true
-
password
&+~K4r)"5WGP2j*
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4ef520b5bbc4521edc2b600918eac72d04608600a8ec295df06db5c9ed3a5e13
-
Size
1.7MB
-
MD5
eac50aecd140f50a9b05bd1d7ead0895
-
SHA1
605890b47e3f232196ff9e21ca983a91278f8c1e
-
SHA256
4ef520b5bbc4521edc2b600918eac72d04608600a8ec295df06db5c9ed3a5e13
-
SHA512
eedb9a7ac6465476ba6d62bb2bb5ef5c97fd733bd83a6956d36d087239a8de5d11e020caa14b88723b91979bc39eeac0398c0180f32f452e598465bf5ab82e49
-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-