General
-
Target
9406ba45830d0258aeee4b60657543e5e7ca11372da41571b7f01daaf42f411f
-
Size
822KB
-
Sample
220725-edtkjsdfgm
-
MD5
f7d5dc919384aced8593cc354f86ee5e
-
SHA1
7d2cf0c590e4b6901fa0553cbe83e893862bf4d2
-
SHA256
9406ba45830d0258aeee4b60657543e5e7ca11372da41571b7f01daaf42f411f
-
SHA512
a876072170680f47b3f6dced8f401b9c10d9bbe08f54f7ff83eb688cd6dcfcc7249cfb09928da859d3bd10ed395897947d31e808755f3977f6b5527895df089f
Static task
static1
Behavioral task
behavioral1
Sample
9406ba45830d0258aeee4b60657543e5e7ca11372da41571b7f01daaf42f411f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
9406ba45830d0258aeee4b60657543e5e7ca11372da41571b7f01daaf42f411f.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
185.244.30.120:4066
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Nov12345
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
9406ba45830d0258aeee4b60657543e5e7ca11372da41571b7f01daaf42f411f
-
Size
822KB
-
MD5
f7d5dc919384aced8593cc354f86ee5e
-
SHA1
7d2cf0c590e4b6901fa0553cbe83e893862bf4d2
-
SHA256
9406ba45830d0258aeee4b60657543e5e7ca11372da41571b7f01daaf42f411f
-
SHA512
a876072170680f47b3f6dced8f401b9c10d9bbe08f54f7ff83eb688cd6dcfcc7249cfb09928da859d3bd10ed395897947d31e808755f3977f6b5527895df089f
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-