General
-
Target
647f075a30a3b628fa2b988223dde0f69bb0149b33fced9a78806de23ab7937c
-
Size
1.2MB
-
Sample
220731-fe5vmsghd6
-
MD5
1bea501f52f6075bb7ca051ad4454e8c
-
SHA1
73f2f06dfa4a91bda577df01ac6b55189126f9ed
-
SHA256
647f075a30a3b628fa2b988223dde0f69bb0149b33fced9a78806de23ab7937c
-
SHA512
130ad7fd52c0f72fbb4bc13387bcc2d36d4dede4f2000bf2bba4d5a1f97f4e0ff71b18541179264be5e0502a2584444766c1e564fb90ba2623ed4875c9e78dde
Static task
static1
Behavioral task
behavioral1
Sample
647f075a30a3b628fa2b988223dde0f69bb0149b33fced9a78806de23ab7937c.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
info1.nowddns.com:5552
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Sms v2.0
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
wBXPRhxS
-
offline_keylogger
true
-
password
caster
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
647f075a30a3b628fa2b988223dde0f69bb0149b33fced9a78806de23ab7937c
-
Size
1.2MB
-
MD5
1bea501f52f6075bb7ca051ad4454e8c
-
SHA1
73f2f06dfa4a91bda577df01ac6b55189126f9ed
-
SHA256
647f075a30a3b628fa2b988223dde0f69bb0149b33fced9a78806de23ab7937c
-
SHA512
130ad7fd52c0f72fbb4bc13387bcc2d36d4dede4f2000bf2bba4d5a1f97f4e0ff71b18541179264be5e0502a2584444766c1e564fb90ba2623ed4875c9e78dde
-
NetWire RAT payload
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-