General
-
Target
0dc24cc234e7b9256b58ad51ba14b93a62510bf758dd51f4bd998407c3d16a10
-
Size
963KB
-
Sample
220724-sf581sgcgl
-
MD5
ca67d8d25dee9e618c4c6ad2d04745df
-
SHA1
a8abda0552a7a6540ca6e7261468d66633c72003
-
SHA256
0dc24cc234e7b9256b58ad51ba14b93a62510bf758dd51f4bd998407c3d16a10
-
SHA512
bc4cd0612682375f58136f5aee3a2fff3d7a8d399b00c82060bff19138c026aad4cc826bb1257f2b1b8e8e571aa97195728d79cbb58ec4277cab1c5e0de70a76
Static task
static1
Behavioral task
behavioral1
Sample
0dc24cc234e7b9256b58ad51ba14b93a62510bf758dd51f4bd998407c3d16a10.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
alisteelhousee.ddns.net:64536
-
activex_autorun
false
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Hismercy.1234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
0dc24cc234e7b9256b58ad51ba14b93a62510bf758dd51f4bd998407c3d16a10
-
Size
963KB
-
MD5
ca67d8d25dee9e618c4c6ad2d04745df
-
SHA1
a8abda0552a7a6540ca6e7261468d66633c72003
-
SHA256
0dc24cc234e7b9256b58ad51ba14b93a62510bf758dd51f4bd998407c3d16a10
-
SHA512
bc4cd0612682375f58136f5aee3a2fff3d7a8d399b00c82060bff19138c026aad4cc826bb1257f2b1b8e8e571aa97195728d79cbb58ec4277cab1c5e0de70a76
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-