General
-
Target
5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab
-
Size
989KB
-
Sample
220724-ft7yjsgbfk
-
MD5
09f7912493d7b995e0d765387b8ce2a1
-
SHA1
0bcf195f1a77e3d02c67b532780796fb1a37d25f
-
SHA256
5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab
-
SHA512
97cd60f9afca58ccd0b52d54ac9b0f4ea8f7c2d03a500ee16df7e1d3ce1a1c4fca13ee5e919e4787c44729a4bff45a28f9831e07259649064e77de889be1dba1
Static task
static1
Behavioral task
behavioral1
Sample
5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
91.192.100.25:3369
-
activex_autorun
true
-
activex_key
{3757GA31-8R2X-4686-5K7C-I4FIR5682QEX}
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab
-
Size
989KB
-
MD5
09f7912493d7b995e0d765387b8ce2a1
-
SHA1
0bcf195f1a77e3d02c67b532780796fb1a37d25f
-
SHA256
5927e4d65f85b8656396c8f02379f3954d38f19ac63e9d00596f666f6dc796ab
-
SHA512
97cd60f9afca58ccd0b52d54ac9b0f4ea8f7c2d03a500ee16df7e1d3ce1a1c4fca13ee5e919e4787c44729a4bff45a28f9831e07259649064e77de889be1dba1
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NetWire RAT payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-