General
-
Target
d8b2c915d50c923faf1ca9d6b76fb9df
-
Size
909KB
-
Sample
220804-1df54sccdk
-
MD5
d8b2c915d50c923faf1ca9d6b76fb9df
-
SHA1
af76c28e956e89d28dfe3731f58cafceea632fb1
-
SHA256
03f96159efede3e3105ed99ddcd73e232cb6ad16b64de0f10ac25b95f522edf2
-
SHA512
8065928fdcd322d75294059d0bbb52a11dfc707a0c6923e7a3b25bd1d3a08147c9780b08152ae2fe316ff3a5d7fcbd94920604d8efed59154d3b2f7e40c6692e
Static task
static1
Behavioral task
behavioral1
Sample
INV03483287732.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
149.102.132.253:3399
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
INV03483287732.exe
-
Size
782KB
-
MD5
2fe9032113e6cad33dee260c180cf758
-
SHA1
db6b2f0bc2936400b3b1c8c118a77d0ba4e61c57
-
SHA256
171c720d3c447b5011c0de2a4669df9406bcf4ba7581c7e8582f4ad526bb43b2
-
SHA512
70245873ee8fca013357437af10bd6a2a34cf094bb46a34466b91743943ab3ea4b561100a6768bec684f1a0f30f0e4ed9b643b4f8728da69141df7e886f86cde
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-