General
-
Target
596c61c9c3a7a0ba5419dab7a5ef731310560bbd8720fc8d157deb6c1b77762b
-
Size
484KB
-
Sample
220724-ekh3dseeap
-
MD5
9ceb56c944daaac4d44ec26684512979
-
SHA1
7df0bcc528c506ad4cde9bde3cfdce0e9dc471e7
-
SHA256
596c61c9c3a7a0ba5419dab7a5ef731310560bbd8720fc8d157deb6c1b77762b
-
SHA512
a7ddfbf68b943662fc74b700d1ce18b5449081a7e77d32c549cbeee565b2c12402ae5340b1ec06b4b314650b84b3d0b9156a44816af281851f9880b351ae54c3
Static task
static1
Behavioral task
behavioral1
Sample
596c61c9c3a7a0ba5419dab7a5ef731310560bbd8720fc8d157deb6c1b77762b.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
185.208.211.136:3368
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
UIOnYWdp
-
offline_keylogger
true
-
password
Gentle123
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
596c61c9c3a7a0ba5419dab7a5ef731310560bbd8720fc8d157deb6c1b77762b
-
Size
484KB
-
MD5
9ceb56c944daaac4d44ec26684512979
-
SHA1
7df0bcc528c506ad4cde9bde3cfdce0e9dc471e7
-
SHA256
596c61c9c3a7a0ba5419dab7a5ef731310560bbd8720fc8d157deb6c1b77762b
-
SHA512
a7ddfbf68b943662fc74b700d1ce18b5449081a7e77d32c549cbeee565b2c12402ae5340b1ec06b4b314650b84b3d0b9156a44816af281851f9880b351ae54c3
-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-