General
-
Target
f5d2f36d2eb3da932a44aa413182a18d6b3d47d11346d9943c37ab907daf4b09
-
Size
258KB
-
Sample
220731-hgmsysdah9
-
MD5
dc0e9d999a069b736be23872cce791c6
-
SHA1
80ba32eaf12efd4f5e8d0d1c67c24dd86181817d
-
SHA256
f5d2f36d2eb3da932a44aa413182a18d6b3d47d11346d9943c37ab907daf4b09
-
SHA512
1b1b9ed216730516c4c98d747632d42b67e6694f9be0da3da841b6410f2dffc799867af8f40c8e75ddcf6114814e90b46fc8dc56750d74d4659518ea74a378b9
Static task
static1
Behavioral task
behavioral1
Sample
f5d2f36d2eb3da932a44aa413182a18d6b3d47d11346d9943c37ab907daf4b09.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
zicopele2018.sytes.net:3584
zicopele2018backup.sytes.net:3584
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
vkRChWpP
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
f5d2f36d2eb3da932a44aa413182a18d6b3d47d11346d9943c37ab907daf4b09
-
Size
258KB
-
MD5
dc0e9d999a069b736be23872cce791c6
-
SHA1
80ba32eaf12efd4f5e8d0d1c67c24dd86181817d
-
SHA256
f5d2f36d2eb3da932a44aa413182a18d6b3d47d11346d9943c37ab907daf4b09
-
SHA512
1b1b9ed216730516c4c98d747632d42b67e6694f9be0da3da841b6410f2dffc799867af8f40c8e75ddcf6114814e90b46fc8dc56750d74d4659518ea74a378b9
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-