General
-
Target
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f
-
Size
558KB
-
Sample
220724-rpm85afedn
-
MD5
f131435dead0e37aee759622ababb51f
-
SHA1
3fb5bd52e8dc3bbc0a072ceda02255e8f9f4ea70
-
SHA256
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f
-
SHA512
a16240153654064a65c32d17f9b8e6cb75924f37547b93b47a489aaa48a69a8c442947d1f559d1b9efc51a909f96f8e23a93f1bee721e6b2e7180dfcd938552f
Static task
static1
Behavioral task
behavioral1
Sample
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
netwire
173.46.85.16:89
-
activex_autorun
true
-
activex_key
{J418T26D-3X70-W6QE-W00F-G37EOA6W8D23}
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
fbbTJkoP
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f
-
Size
558KB
-
MD5
f131435dead0e37aee759622ababb51f
-
SHA1
3fb5bd52e8dc3bbc0a072ceda02255e8f9f4ea70
-
SHA256
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f
-
SHA512
a16240153654064a65c32d17f9b8e6cb75924f37547b93b47a489aaa48a69a8c442947d1f559d1b9efc51a909f96f8e23a93f1bee721e6b2e7180dfcd938552f
Score10/10-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-