General
-
Target
61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22
-
Size
417KB
-
Sample
220724-ybv55sdgg8
-
MD5
71d59047c2e6db46bd7886acf1ef1f8d
-
SHA1
286fdb9a2c160a26ba3f8437d7b4d23dff605496
-
SHA256
61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22
-
SHA512
1fe94be986c509c8a754c0ba8011f4adb1d50ac87f0d843d8f145341b31b74170ae38f2d7242bfec996d967ef2852196f2ec0dd3d183face8ecf7f6242ad1958
Static task
static1
Behavioral task
behavioral1
Sample
61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
fingers1.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22
-
Size
417KB
-
MD5
71d59047c2e6db46bd7886acf1ef1f8d
-
SHA1
286fdb9a2c160a26ba3f8437d7b4d23dff605496
-
SHA256
61a0abbe8a6fc65fd0eb2fa4d4d41209852c083cf3ded2a664d9e8e713208e22
-
SHA512
1fe94be986c509c8a754c0ba8011f4adb1d50ac87f0d843d8f145341b31b74170ae38f2d7242bfec996d967ef2852196f2ec0dd3d183face8ecf7f6242ad1958
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-