General
-
Target
tmp
-
Size
642KB
-
Sample
220810-1rmvtahdc2
-
MD5
f9322ac00bfcc0cfce12ed4fb88d0aa1
-
SHA1
61d94897a267d53d3f3e3399345c4ecc7918295d
-
SHA256
e1005be756be06a809c11b66b47c79ee2fba85b2870693bee2882f369f03cec7
-
SHA512
202bcd7c5bc00a4d7a71cc73c38abfa927e2ef70b14333637ae5396cae5eb9035902a2da436efb9128d599c6a9dbdf43fed12c869a5affa2bce5ccce25d572d1
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220715-en
Malware Config
Extracted
netwire
194.5.98.126:3378
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Pass@2023
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
tmp
-
Size
642KB
-
MD5
f9322ac00bfcc0cfce12ed4fb88d0aa1
-
SHA1
61d94897a267d53d3f3e3399345c4ecc7918295d
-
SHA256
e1005be756be06a809c11b66b47c79ee2fba85b2870693bee2882f369f03cec7
-
SHA512
202bcd7c5bc00a4d7a71cc73c38abfa927e2ef70b14333637ae5396cae5eb9035902a2da436efb9128d599c6a9dbdf43fed12c869a5affa2bce5ccce25d572d1
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-