General
-
Target
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
-
Size
1.3MB
-
Sample
220725-dqvspscegn
-
MD5
9f87dadf4d0571f3e441c9d5911864c8
-
SHA1
832dfa671b4be3085e997ffd46e0bc243f1f74b8
-
SHA256
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
-
SHA512
02750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580
Static task
static1
Behavioral task
behavioral1
Sample
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
185.244.30.254:3361
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
-
Size
1.3MB
-
MD5
9f87dadf4d0571f3e441c9d5911864c8
-
SHA1
832dfa671b4be3085e997ffd46e0bc243f1f74b8
-
SHA256
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
-
SHA512
02750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580
-
NetWire RAT payload
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-