General
-
Target
5b5c82b3faef7808ecfe08bd812f954b0d45fb01688a8845eead0441be4db99a
-
Size
1.2MB
-
Sample
220802-acn68abhdk
-
MD5
c7a0eff85efeba1d7252a46354df797a
-
SHA1
872b3376aa40a05da2289f5d8078aec1364bdff3
-
SHA256
5b5c82b3faef7808ecfe08bd812f954b0d45fb01688a8845eead0441be4db99a
-
SHA512
2e4bafa9ec7c05ab1b143802e8f413439036341e886d4c836c84936f3bc7772ed9a8833c747450a12fa4f673be029c370d1bfcdb479b7e0dfef74c1778577ca2
Static task
static1
Behavioral task
behavioral1
Sample
5b5c82b3faef7808ecfe08bd812f954b0d45fb01688a8845eead0441be4db99a.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
manuel3.publicvm.com:3366
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Mine Netwire
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
TbSYfUnj
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
5b5c82b3faef7808ecfe08bd812f954b0d45fb01688a8845eead0441be4db99a
-
Size
1.2MB
-
MD5
c7a0eff85efeba1d7252a46354df797a
-
SHA1
872b3376aa40a05da2289f5d8078aec1364bdff3
-
SHA256
5b5c82b3faef7808ecfe08bd812f954b0d45fb01688a8845eead0441be4db99a
-
SHA512
2e4bafa9ec7c05ab1b143802e8f413439036341e886d4c836c84936f3bc7772ed9a8833c747450a12fa4f673be029c370d1bfcdb479b7e0dfef74c1778577ca2
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-