General
-
Target
53b508c54ea4330a1ae631a945be3e2d1fbf71a6dc40c34cb995321902bf6a12
-
Size
951KB
-
Sample
220727-awnpssbdd2
-
MD5
565163e129dd6bbad0cc464ecc597893
-
SHA1
33a91a5d01f8edbe2649e43383d6eecebdf7e77b
-
SHA256
53b508c54ea4330a1ae631a945be3e2d1fbf71a6dc40c34cb995321902bf6a12
-
SHA512
15e35fc5ab0b3a93c0a0cf9aae969e30249cd6db45b8e30f7da21cd11af1999279e3fec624c960cedce63b496572fc706144ce191dcc3c4cfd585e4e82a4ee6c
Static task
static1
Behavioral task
behavioral1
Sample
53b508c54ea4330a1ae631a945be3e2d1fbf71a6dc40c34cb995321902bf6a12.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
53b508c54ea4330a1ae631a945be3e2d1fbf71a6dc40c34cb995321902bf6a12.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
netwire
polandnelly.duckdns.org:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
poland
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
poland112
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
53b508c54ea4330a1ae631a945be3e2d1fbf71a6dc40c34cb995321902bf6a12
-
Size
951KB
-
MD5
565163e129dd6bbad0cc464ecc597893
-
SHA1
33a91a5d01f8edbe2649e43383d6eecebdf7e77b
-
SHA256
53b508c54ea4330a1ae631a945be3e2d1fbf71a6dc40c34cb995321902bf6a12
-
SHA512
15e35fc5ab0b3a93c0a0cf9aae969e30249cd6db45b8e30f7da21cd11af1999279e3fec624c960cedce63b496572fc706144ce191dcc3c4cfd585e4e82a4ee6c
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-