General
-
Target
cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72
-
Size
521KB
-
Sample
220725-dkbgwacae8
-
MD5
c784ee0059d15987a9a306e322e0d062
-
SHA1
cf78fdd65e08005131e4ef42912fc8e07d685fa0
-
SHA256
cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72
-
SHA512
6a85028af5becb599a130c3947a2f17d24672b35a676d7397efd9072df7cfe33fe4a3ccb8544e6f671524add7697100546bec351c357017f69f2ee74019b1463
Static task
static1
Behavioral task
behavioral1
Sample
cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
185.171.25.3:1406
-
activex_autorun
true
-
activex_key
{IXXTPY86-B7O0-U8M5-0OD1-4Y2C8828J3G0}
-
copy_executable
true
-
delete_original
false
-
host_id
bubu
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
mutex
tvNRDcbc
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72
-
Size
521KB
-
MD5
c784ee0059d15987a9a306e322e0d062
-
SHA1
cf78fdd65e08005131e4ef42912fc8e07d685fa0
-
SHA256
cc4fc81c6827c57ebc0ddf6a197e2e6277839e3b0f7c2d94a88dd5c91d586e72
-
SHA512
6a85028af5becb599a130c3947a2f17d24672b35a676d7397efd9072df7cfe33fe4a3ccb8544e6f671524add7697100546bec351c357017f69f2ee74019b1463
-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-