General
-
Target
PAYMENT.EXE.exe
-
Size
730KB
-
Sample
220728-lrl6ysagf3
-
MD5
0f7acac42bf200953c39a59dc526abf4
-
SHA1
18e98f49b44046fed0ae7ee23d29653d6f40f09e
-
SHA256
fa7af6b88b54a5210f0ce1e5415024049ce296a6736cfdbfe6364b548f16b2d5
-
SHA512
6eefebcd507117f412ea7d04ff63ace99ceec1b5c92a80cd5cac0975bc3fa266def09fa27cbd7cff77714cc5316acb05b46f0e99f40d6cdcbf73532c7968245c
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT.EXE.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
37.0.14.199:3374
37.0.14.199:3377
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
lovemoney12
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
PAYMENT.EXE.exe
-
Size
730KB
-
MD5
0f7acac42bf200953c39a59dc526abf4
-
SHA1
18e98f49b44046fed0ae7ee23d29653d6f40f09e
-
SHA256
fa7af6b88b54a5210f0ce1e5415024049ce296a6736cfdbfe6364b548f16b2d5
-
SHA512
6eefebcd507117f412ea7d04ff63ace99ceec1b5c92a80cd5cac0975bc3fa266def09fa27cbd7cff77714cc5316acb05b46f0e99f40d6cdcbf73532c7968245c
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-