General
-
Target
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
-
Size
571KB
-
Sample
220725-fp1cxaffh8
-
MD5
c4e5cf65384d74ccae53b3703200a43f
-
SHA1
007cc54e2e4d6a424594750e0efca1d1a916b35c
-
SHA256
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
-
SHA512
7c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
Behavioral task
behavioral1
Sample
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
127.0.0.1:3360
192.3.24.231:3360
-
activex_autorun
true
-
activex_key
{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5}
-
copy_executable
true
-
delete_original
false
-
host_id
wolla
-
install_path
%AppData%\WndowsDefender\windowsdfender.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Zynova@56070
-
registry_autorun
true
-
startup_name
windefender
-
use_mutex
false
Targets
-
-
Target
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
-
Size
571KB
-
MD5
c4e5cf65384d74ccae53b3703200a43f
-
SHA1
007cc54e2e4d6a424594750e0efca1d1a916b35c
-
SHA256
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
-
SHA512
7c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-