General
-
Target
Invoice.exe
-
Size
566KB
-
Sample
220727-n2al1shba7
-
MD5
c0d2dfdb840f78a114b0a59f3fff0f67
-
SHA1
6506d8f5e7f331ab107f61546e71bd3c7902a383
-
SHA256
2000ada5b57a380a1b64080683830a5e8cb8b6a1a0e3859216090d01748b7b7c
-
SHA512
0f4ff3a4c317cfc895a19bf28bee53d7e624e53a29b3cf55a2dd7dbaf072eb49d6af7cb128c40c03878f6ebb46116fc4176fdf0fafe3c89510584db09a66f4eb
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
185.140.53.61:3363
185.140.53.61:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Invoice.exe
-
Size
566KB
-
MD5
c0d2dfdb840f78a114b0a59f3fff0f67
-
SHA1
6506d8f5e7f331ab107f61546e71bd3c7902a383
-
SHA256
2000ada5b57a380a1b64080683830a5e8cb8b6a1a0e3859216090d01748b7b7c
-
SHA512
0f4ff3a4c317cfc895a19bf28bee53d7e624e53a29b3cf55a2dd7dbaf072eb49d6af7cb128c40c03878f6ebb46116fc4176fdf0fafe3c89510584db09a66f4eb
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-