General
-
Target
57caee8d477c98f79b6000cd3a68ee11bf8214ad2ef562c140de04190d0f95d3
-
Size
1.3MB
-
Sample
220724-yrm5gaegcp
-
MD5
62b013ee2427ac85a5e7ee93d46030a6
-
SHA1
d3e13784f2eab865637413bd74d8cdfcea59d3f6
-
SHA256
57caee8d477c98f79b6000cd3a68ee11bf8214ad2ef562c140de04190d0f95d3
-
SHA512
43a885eb1f993e041143dae957310b1d76208c1d0b4d24282fef4c36ffdcf76f3f487f0d834bd4e58c11839371e2408d55cf1cf93e7a106f45e467a1a99c0fab
Static task
static1
Behavioral task
behavioral1
Sample
57caee8d477c98f79b6000cd3a68ee11bf8214ad2ef562c140de04190d0f95d3.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
halwachi50.mymediapc.net:5868
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
57caee8d477c98f79b6000cd3a68ee11bf8214ad2ef562c140de04190d0f95d3
-
Size
1.3MB
-
MD5
62b013ee2427ac85a5e7ee93d46030a6
-
SHA1
d3e13784f2eab865637413bd74d8cdfcea59d3f6
-
SHA256
57caee8d477c98f79b6000cd3a68ee11bf8214ad2ef562c140de04190d0f95d3
-
SHA512
43a885eb1f993e041143dae957310b1d76208c1d0b4d24282fef4c36ffdcf76f3f487f0d834bd4e58c11839371e2408d55cf1cf93e7a106f45e467a1a99c0fab
-
NetWire RAT payload
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-