General
-
Target
4328753e0685f48e5ee0e212e5bafbce11c43fb2aaa37a0b4d9fa6303d89e29d
-
Size
1.1MB
-
Sample
220721-rsq47agaf5
-
MD5
4388de7dad58c945135233312a05daa8
-
SHA1
2a6f646402485d6e54e95bcffdbd632d8b433298
-
SHA256
4328753e0685f48e5ee0e212e5bafbce11c43fb2aaa37a0b4d9fa6303d89e29d
-
SHA512
e23e4c7f45640ce08fca109ed9c45c83510d4b0f31a25001eade3da9a73ddc33e39eaa192160b5337c496a161be32231544e7604da35a8280fd316938f15061a
Static task
static1
Behavioral task
behavioral1
Sample
4328753e0685f48e5ee0e212e5bafbce11c43fb2aaa37a0b4d9fa6303d89e29d.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
xman2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4328753e0685f48e5ee0e212e5bafbce11c43fb2aaa37a0b4d9fa6303d89e29d
-
Size
1.1MB
-
MD5
4388de7dad58c945135233312a05daa8
-
SHA1
2a6f646402485d6e54e95bcffdbd632d8b433298
-
SHA256
4328753e0685f48e5ee0e212e5bafbce11c43fb2aaa37a0b4d9fa6303d89e29d
-
SHA512
e23e4c7f45640ce08fca109ed9c45c83510d4b0f31a25001eade3da9a73ddc33e39eaa192160b5337c496a161be32231544e7604da35a8280fd316938f15061a
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-