General
-
Target
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
-
Size
504KB
-
Sample
220724-sg43cagcc5
-
MD5
617f1eb252543b7128c058d8e379086b
-
SHA1
704ff32daf0438df76eca57067eb8f075d2bcc28
-
SHA256
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
-
SHA512
1c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
Static task
static1
Behavioral task
behavioral1
Sample
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
icf-fx.serveirc.com:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
kVTnVlks
-
offline_keylogger
true
-
password
goodluck
-
registry_autorun
true
-
startup_name
Windows Defender
-
use_mutex
true
Targets
-
-
Target
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
-
Size
504KB
-
MD5
617f1eb252543b7128c058d8e379086b
-
SHA1
704ff32daf0438df76eca57067eb8f075d2bcc28
-
SHA256
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
-
SHA512
1c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-