General
-
Target
5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326
-
Size
1002KB
-
Sample
220724-cd2vtaahak
-
MD5
69da18e4bcdad84f3233a2953f7aaf98
-
SHA1
7a7b87d3dcede30f192e3929b0412a89c9da58ee
-
SHA256
5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326
-
SHA512
d995c316f9513a0998e8154077bc01859cc271fb9aa3f1493714da0cd1d776ac645c9eca6dc1511ef1093031fc9fa07025064d49ebc4d99c9f4cbe69fbb32f29
Static task
static1
Behavioral task
behavioral1
Sample
5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
systool.sytes.net:4007
uploadp3p.publicvm.com:4007
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
NeWYeaR-%Rand%
-
install_path
%AppData%\System32\svhosts.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
LCNLrCMr
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326
-
Size
1002KB
-
MD5
69da18e4bcdad84f3233a2953f7aaf98
-
SHA1
7a7b87d3dcede30f192e3929b0412a89c9da58ee
-
SHA256
5a13433353954864e671bf5d8ec247da4fc94f89d81469e5e13993b71125a326
-
SHA512
d995c316f9513a0998e8154077bc01859cc271fb9aa3f1493714da0cd1d776ac645c9eca6dc1511ef1093031fc9fa07025064d49ebc4d99c9f4cbe69fbb32f29
-
NetWire RAT payload
-
Executes dropped EXE
-
Drops startup file
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-