General
-
Target
e5728e656e7e9ecab8239e0516dfc115894e8c2a616148be12eaf3b2ce9fe09b
-
Size
612KB
-
Sample
220731-kmy5aahgak
-
MD5
55a78affac8a3608c214ce7c01069330
-
SHA1
fe6ffd66247cd7db7a8b309e3d691b89ccd4b35a
-
SHA256
e5728e656e7e9ecab8239e0516dfc115894e8c2a616148be12eaf3b2ce9fe09b
-
SHA512
c0047313e5a1a866686685113569cef12d7c05a029fc5fb09ca24d74378e1b310993217debb1d7357282d032cf11bda7f95b08b2d04c778808ae91db6c62d09b
Static task
static1
Behavioral task
behavioral1
Sample
e5728e656e7e9ecab8239e0516dfc115894e8c2a616148be12eaf3b2ce9fe09b.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
e5728e656e7e9ecab8239e0516dfc115894e8c2a616148be12eaf3b2ce9fe09b.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
79.134.225.120:8765
-
activex_autorun
true
-
activex_key
{L501JP3X-C6PC-RH36-475X-RS2C2OQHHGS0}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Targets
-
-
Target
e5728e656e7e9ecab8239e0516dfc115894e8c2a616148be12eaf3b2ce9fe09b
-
Size
612KB
-
MD5
55a78affac8a3608c214ce7c01069330
-
SHA1
fe6ffd66247cd7db7a8b309e3d691b89ccd4b35a
-
SHA256
e5728e656e7e9ecab8239e0516dfc115894e8c2a616148be12eaf3b2ce9fe09b
-
SHA512
c0047313e5a1a866686685113569cef12d7c05a029fc5fb09ca24d74378e1b310993217debb1d7357282d032cf11bda7f95b08b2d04c778808ae91db6c62d09b
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-