General
-
Target
58fab2095db9600ef494c29f59b9d46794a1eb73994d9da82681fae99711c7f4
-
Size
468KB
-
Sample
220724-gl5nwshfan
-
MD5
5a1f3083232ffdc15ea996a3f093978b
-
SHA1
5a993586536b5db82d1184697d7c0ac5ec792163
-
SHA256
58fab2095db9600ef494c29f59b9d46794a1eb73994d9da82681fae99711c7f4
-
SHA512
2d456b877a68cd6d1305bfa76338fe5d7adb77a5e6171e0ecf558de1fdf364d7414c7c48daa5e45ebf82139b503368746f0e2e1322befad08db4993a8ee9c47d
Static task
static1
Behavioral task
behavioral1
Sample
58fab2095db9600ef494c29f59b9d46794a1eb73994d9da82681fae99711c7f4.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
58fab2095db9600ef494c29f59b9d46794a1eb73994d9da82681fae99711c7f4.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
netwire
185.84.181.80:3360
-
activex_autorun
true
-
activex_key
{XB5ESHJ7-33B5-3K88-N30U-N8M7T10LX6TM}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\svlhost.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
NuWOVQer
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
58fab2095db9600ef494c29f59b9d46794a1eb73994d9da82681fae99711c7f4
-
Size
468KB
-
MD5
5a1f3083232ffdc15ea996a3f093978b
-
SHA1
5a993586536b5db82d1184697d7c0ac5ec792163
-
SHA256
58fab2095db9600ef494c29f59b9d46794a1eb73994d9da82681fae99711c7f4
-
SHA512
2d456b877a68cd6d1305bfa76338fe5d7adb77a5e6171e0ecf558de1fdf364d7414c7c48daa5e45ebf82139b503368746f0e2e1322befad08db4993a8ee9c47d
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-