General
-
Target
e539e30456d5824fd3fa5b200f5578a8
-
Size
556KB
-
Sample
220722-waka5sgher
-
MD5
e539e30456d5824fd3fa5b200f5578a8
-
SHA1
df6effe3512f60d932c99f66cbc57351bacbac14
-
SHA256
e7b7b828f1add6b862ccd69e5b0ecab7fc0926ed6e91f3f273c75a22edef2927
-
SHA512
daf01e697e65a4d971da779c356fd65b44339a363bbb9649f2b6a2da0ceffabb6462dc7e81c53b52f1714fc204d816017f98cfaf55956d150c45a5408a0617ad
Static task
static1
Behavioral task
behavioral1
Sample
e539e30456d5824fd3fa5b200f5578a8.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
185.140.53.154:3343
185.140.53.154:3345
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Pass@2022
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
e539e30456d5824fd3fa5b200f5578a8
-
Size
556KB
-
MD5
e539e30456d5824fd3fa5b200f5578a8
-
SHA1
df6effe3512f60d932c99f66cbc57351bacbac14
-
SHA256
e7b7b828f1add6b862ccd69e5b0ecab7fc0926ed6e91f3f273c75a22edef2927
-
SHA512
daf01e697e65a4d971da779c356fd65b44339a363bbb9649f2b6a2da0ceffabb6462dc7e81c53b52f1714fc204d816017f98cfaf55956d150c45a5408a0617ad
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-