General
-
Target
e4497e65a70f5b67e047a77edcd9e5b4b422db8849e502f2e6515c13bb512ef9
-
Size
584KB
-
Sample
220731-hbtdjsdgbk
-
MD5
8aea8fc8826fe38a4f4122b7fb50b13b
-
SHA1
7b38e56acf0b18425e864174331a98cb99846fc4
-
SHA256
e4497e65a70f5b67e047a77edcd9e5b4b422db8849e502f2e6515c13bb512ef9
-
SHA512
ff390e8d79c94264789262d2bfb4ac7899a87c2e7b5a299268b4a88ad3ba01d916a33f06b32f0893d0beb92bbdb626a6f5e827a8ae02cc316152118e4a996cac
Static task
static1
Behavioral task
behavioral1
Sample
e4497e65a70f5b67e047a77edcd9e5b4b422db8849e502f2e6515c13bb512ef9.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
10.99.94.6:9008
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
e4497e65a70f5b67e047a77edcd9e5b4b422db8849e502f2e6515c13bb512ef9
-
Size
584KB
-
MD5
8aea8fc8826fe38a4f4122b7fb50b13b
-
SHA1
7b38e56acf0b18425e864174331a98cb99846fc4
-
SHA256
e4497e65a70f5b67e047a77edcd9e5b4b422db8849e502f2e6515c13bb512ef9
-
SHA512
ff390e8d79c94264789262d2bfb4ac7899a87c2e7b5a299268b4a88ad3ba01d916a33f06b32f0893d0beb92bbdb626a6f5e827a8ae02cc316152118e4a996cac
-
NetWire RAT payload
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-