General
-
Target
5691c9faace16caa42cfc4b8cd06c1b7ac56809333534f737c9dc239f0d882fb
-
Size
292KB
-
Sample
220725-c2n9mabbd2
-
MD5
f3ee8ac24e5c6ddb964db9bd38aa6224
-
SHA1
e3000becb6ddaf78fdaa9ad16617eed6fa91c5f0
-
SHA256
5691c9faace16caa42cfc4b8cd06c1b7ac56809333534f737c9dc239f0d882fb
-
SHA512
aacd26f56db9eb8ff3f8166abc0dcd50fa0f768e8a6980340b31245d863940efd0f0d1e94e56e23b650582d630432666e5a52b8d45390f908ad413a711b8b9d5
Static task
static1
Behavioral task
behavioral1
Sample
5691c9faace16caa42cfc4b8cd06c1b7ac56809333534f737c9dc239f0d882fb.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5691c9faace16caa42cfc4b8cd06c1b7ac56809333534f737c9dc239f0d882fb.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
extensions14718.sytes.net:3324
extensions14718sec.sytes.net:3324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
AJTAsMDe
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
5691c9faace16caa42cfc4b8cd06c1b7ac56809333534f737c9dc239f0d882fb
-
Size
292KB
-
MD5
f3ee8ac24e5c6ddb964db9bd38aa6224
-
SHA1
e3000becb6ddaf78fdaa9ad16617eed6fa91c5f0
-
SHA256
5691c9faace16caa42cfc4b8cd06c1b7ac56809333534f737c9dc239f0d882fb
-
SHA512
aacd26f56db9eb8ff3f8166abc0dcd50fa0f768e8a6980340b31245d863940efd0f0d1e94e56e23b650582d630432666e5a52b8d45390f908ad413a711b8b9d5
-
NetWire RAT payload
-
Executes dropped EXE
-