General
-
Target
4e43e59f1c041a082f67e237541a686b7d18c93fe9d44bed61249fec755e39a5
-
Size
1.1MB
-
Sample
220720-wr3h2sebe5
-
MD5
905dcfba0df2be874d24d0868f170443
-
SHA1
a254cf1d1cdadbb81a627ce6d0807bd0f66f1465
-
SHA256
4e43e59f1c041a082f67e237541a686b7d18c93fe9d44bed61249fec755e39a5
-
SHA512
01f1848d0653f032c2252194fd1773407f573551928b72424f4c0fe7128a34c4ae65f08081b6eba9038d43504f0fa06af1776e2dffd16098903b98ef1731bc77
Static task
static1
Behavioral task
behavioral1
Sample
4e43e59f1c041a082f67e237541a686b7d18c93fe9d44bed61249fec755e39a5.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
4e43e59f1c041a082f67e237541a686b7d18c93fe9d44bed61249fec755e39a5
-
Size
1.1MB
-
MD5
905dcfba0df2be874d24d0868f170443
-
SHA1
a254cf1d1cdadbb81a627ce6d0807bd0f66f1465
-
SHA256
4e43e59f1c041a082f67e237541a686b7d18c93fe9d44bed61249fec755e39a5
-
SHA512
01f1848d0653f032c2252194fd1773407f573551928b72424f4c0fe7128a34c4ae65f08081b6eba9038d43504f0fa06af1776e2dffd16098903b98ef1731bc77
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-