General
-
Target
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
-
Size
196KB
-
Sample
220724-yfg43seccq
-
MD5
40af2d46b77bcdc84924c5b6a29bfe2d
-
SHA1
8ff1371ddd1fc3839c06d4cc1f86166873a6c726
-
SHA256
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
-
SHA512
860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
Static task
static1
Behavioral task
behavioral1
Sample
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
Resource
win7-20220718-en
Malware Config
Targets
-
-
Target
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
-
Size
196KB
-
MD5
40af2d46b77bcdc84924c5b6a29bfe2d
-
SHA1
8ff1371ddd1fc3839c06d4cc1f86166873a6c726
-
SHA256
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
-
SHA512
860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
-
NetWire RAT payload
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-