General
-
Target
e6d92ae4bd68881ca34a4afa1a2fd890.exe
-
Size
1.1MB
-
Sample
220809-w4bk4aecdm
-
MD5
e6d92ae4bd68881ca34a4afa1a2fd890
-
SHA1
ab57049aab3945ef97766eb909fca8f700039c42
-
SHA256
3a6ef5a50738a5230ca6c62f187b62b134ca090ba559f65c8a8204d9a66f724d
-
SHA512
f6bbfb7ae64dbe6222258576dfbd6f1d66a6064a653471b5fbb1811b0870bce9a3fb3b6a3dba13d8e1e892670601307b13750336c731e8cf34fd3a54ac9ee89e
Static task
static1
Behavioral task
behavioral1
Sample
e6d92ae4bd68881ca34a4afa1a2fd890.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
185.140.53.154:3343
185.140.53.154:3345
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Pass@2022
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
e6d92ae4bd68881ca34a4afa1a2fd890.exe
-
Size
1.1MB
-
MD5
e6d92ae4bd68881ca34a4afa1a2fd890
-
SHA1
ab57049aab3945ef97766eb909fca8f700039c42
-
SHA256
3a6ef5a50738a5230ca6c62f187b62b134ca090ba559f65c8a8204d9a66f724d
-
SHA512
f6bbfb7ae64dbe6222258576dfbd6f1d66a6064a653471b5fbb1811b0870bce9a3fb3b6a3dba13d8e1e892670601307b13750336c731e8cf34fd3a54ac9ee89e
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-