General
-
Target
Contract Wipak Oy 2022.pdf.jar
-
Size
661KB
-
Sample
220725-k9l38sbba7
-
MD5
76ac0a4fe6e086b38fa3e0f3ed5595c2
-
SHA1
cefef7e0834aa70ef2b3595459f510dbfe274560
-
SHA256
022a25c3b9a1973f3bf01598cf22ae87640fa8d71c8564bda601c43249df09a9
-
SHA512
3d77cb52aa553aab6f249db71d9db89a5744951a477380a7ff925a6496aa9b3f7ff88fbbca2960748a6ca647c22858e6af9b04dfa7c564c66cc44dcafa18613a
Static task
static1
Behavioral task
behavioral1
Sample
Contract Wipak Oy 2022.pdf.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Contract Wipak Oy 2022.pdf.exe
-
Size
675KB
-
MD5
5d7895b3ede1833a79a5c4fc7dc0455c
-
SHA1
714ce92fce404b32345b06e1d0fbbfaff30eaa62
-
SHA256
7d43cddf5679f4233ebf701f89050ec267f892165a4c34084ad65963af7ebc36
-
SHA512
6f0a9c1cb2d74436ebde9b2c1068902bb9e0a943fc59f788f3c9e37e037b6dd9c0e5e86f2aa3d9c67e9740e7012f42c96d04ba0f2c3ac69a1c1c106db4fbe26d
-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-