General
-
Target
bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca
-
Size
1.2MB
-
Sample
220724-zztsnagfek
-
MD5
1c1dc513c93df358bbfe566a37b32359
-
SHA1
7281a9babd20a1a5a48ace5fdefa558603c55152
-
SHA256
bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca
-
SHA512
fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f
Static task
static1
Behavioral task
behavioral1
Sample
bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
pd1n.ddns.net:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n-noip
-
lock_executable
false
-
offline_keylogger
false
-
password
Kimbolsapoq!P12
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca
-
Size
1.2MB
-
MD5
1c1dc513c93df358bbfe566a37b32359
-
SHA1
7281a9babd20a1a5a48ace5fdefa558603c55152
-
SHA256
bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca
-
SHA512
fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-