General

  • Target

    a6390106edb370abb8e883ad0086cd2859682d90d4561f997ecb464f44fd0432

  • Size

    105KB

  • MD5

    e1feabc1d68e3240a27c8439bd10a6b9

  • SHA1

    4a6305b9bed952db5f7ad5fa83cce36494f4c19b

  • SHA256

    a6390106edb370abb8e883ad0086cd2859682d90d4561f997ecb464f44fd0432

  • SHA512

    3fbf8d44523f6f5ca2d674ba2e6e7e54041a47b985e0cea846744c30bfe7925b21348f47fb89fc6bae3a31247862fbcfdac64468e07a5692e1461a423eadb719

  • SSDEEP

    1536:W+kWqNoD2BUvkeO6Vwu1CwNGG6nJnwSN3QPD6B1FfZ1qkHQemwZSbUgoDwSTyn:WdWSUvu0CwNcnFzZI+myDXTyn

Score
10/10

Malware Config

Extracted

Family

netwire

C2

engine79.ddns.net:4414

chrisle79.ddns.net:4414

jacknop79.ddns.net:4414

smath79.ddns.net:4414

whatis79.ddns.net:4414

goodgt79.ddns.net:4414

bonding79.ddns.net:4414

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    June 2019

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    nrYPKjrp

  • offline_keylogger

    true

  • password

    Password2$

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • a6390106edb370abb8e883ad0086cd2859682d90d4561f997ecb464f44fd0432
    .exe windows x64

    e1c7c518b9eed89ccdd036e87dc17f07


    Headers

    Imports

    Sections