General
-
Target
c889cd858861848e947cc1a039149ceeab145de4f48faa34742e1ba157c711cf
-
Size
688KB
-
Sample
220725-dcketabhem
-
MD5
3c4eed8ed9fa810fc8f4382740165779
-
SHA1
ba573829c289fa7c030b32153f5a890a4981470f
-
SHA256
c889cd858861848e947cc1a039149ceeab145de4f48faa34742e1ba157c711cf
-
SHA512
5c52bf94df8abb57540215b0c08579f0f2f6e56b072cabeba478276724b012bb4beebf9b7dc40231ee3a806048220870e8a78d14123afbee8d5b812171fdc7ad
Static task
static1
Behavioral task
behavioral1
Sample
c889cd858861848e947cc1a039149ceeab145de4f48faa34742e1ba157c711cf.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
c889cd858861848e947cc1a039149ceeab145de4f48faa34742e1ba157c711cf.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
duc1234.duckdns.org:32144
-
activex_autorun
true
-
activex_key
{W3N34QB7-3Y7U-83S3-M151-LGEF68YQU5X6}
-
copy_executable
true
-
delete_original
false
-
host_id
nonsense
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
gbam1234
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
c889cd858861848e947cc1a039149ceeab145de4f48faa34742e1ba157c711cf
-
Size
688KB
-
MD5
3c4eed8ed9fa810fc8f4382740165779
-
SHA1
ba573829c289fa7c030b32153f5a890a4981470f
-
SHA256
c889cd858861848e947cc1a039149ceeab145de4f48faa34742e1ba157c711cf
-
SHA512
5c52bf94df8abb57540215b0c08579f0f2f6e56b072cabeba478276724b012bb4beebf9b7dc40231ee3a806048220870e8a78d14123afbee8d5b812171fdc7ad
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-