General
-
Target
4e3f66bb2fc5fc5c5d3b59f3fae3833f4ddf43132a014729f7c5061e056a81bc
-
Size
326KB
-
Sample
220720-wt91xaece7
-
MD5
6f4ba42f8202789c34ee0f037de67a8d
-
SHA1
52b37aa38ddeccbc57a5c9656cf4baa76136f57f
-
SHA256
4e3f66bb2fc5fc5c5d3b59f3fae3833f4ddf43132a014729f7c5061e056a81bc
-
SHA512
261185f654263a4632bc2a7b10f20b19131e32f8fa32e5ac3d7609a4815c5e56982bfc1e738da034efa00e54f4b6c5de5738b7165e2cc38eac254e13c1dfcc2b
Static task
static1
Behavioral task
behavioral1
Sample
4e3f66bb2fc5fc5c5d3b59f3fae3833f4ddf43132a014729f7c5061e056a81bc.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4e3f66bb2fc5fc5c5d3b59f3fae3833f4ddf43132a014729f7c5061e056a81bc.exe
Resource
win10v2004-20220718-en
Malware Config
Extracted
netwire
elley.dns-cloud.net:4772
brightgee.nsupdate.info:4772
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4e3f66bb2fc5fc5c5d3b59f3fae3833f4ddf43132a014729f7c5061e056a81bc
-
Size
326KB
-
MD5
6f4ba42f8202789c34ee0f037de67a8d
-
SHA1
52b37aa38ddeccbc57a5c9656cf4baa76136f57f
-
SHA256
4e3f66bb2fc5fc5c5d3b59f3fae3833f4ddf43132a014729f7c5061e056a81bc
-
SHA512
261185f654263a4632bc2a7b10f20b19131e32f8fa32e5ac3d7609a4815c5e56982bfc1e738da034efa00e54f4b6c5de5738b7165e2cc38eac254e13c1dfcc2b
-
NetWire RAT payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-