General
-
Target
cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51
-
Size
1.2MB
-
Sample
220731-jzd47sfee2
-
MD5
e87446d66075a90aa1b5f5b22aab3fef
-
SHA1
3424ac9b9426faabd3fe1c5ceb0842ea324ba30d
-
SHA256
cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51
-
SHA512
5acc508a84580bb21087f3273e9a760e23e7d430e5db6bc6863631a9b0b41517a40db187d1a1bf80a2196cf501539527fa29d4341a475b6b43d98a7b3990112b
Static task
static1
Behavioral task
behavioral1
Sample
cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
160.116.15.155:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51
-
Size
1.2MB
-
MD5
e87446d66075a90aa1b5f5b22aab3fef
-
SHA1
3424ac9b9426faabd3fe1c5ceb0842ea324ba30d
-
SHA256
cfae0ebf4895d8f2d6af998603595dd522b922d6dc563184fd79c623ec721d51
-
SHA512
5acc508a84580bb21087f3273e9a760e23e7d430e5db6bc6863631a9b0b41517a40db187d1a1bf80a2196cf501539527fa29d4341a475b6b43d98a7b3990112b
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-