General
-
Target
KONTOAUSZUG.exe
-
Size
992KB
-
Sample
220811-ge513sdfb4
-
MD5
37d87eaf0eaadd2da6168f952fea9d8e
-
SHA1
8a7612b99dad36da3a88bdf9ce888de19a9c2be1
-
SHA256
ca6e08d293d450577e851f2802190871e5eff5e0de36915151f63f421eaeaf13
-
SHA512
a1748f0e12c3882783e92093c6198dd9b958fa4099ef69d3f734fa8768c3c114da5a80d25a3419adb7f9735832b4ab402a3b03a22eab85949622dec991cf3bc2
Static task
static1
Behavioral task
behavioral1
Sample
KONTOAUSZUG.exe
Resource
win7-20220718-en
Malware Config
Extracted
netwire
xman2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
KONTOAUSZUG.exe
-
Size
992KB
-
MD5
37d87eaf0eaadd2da6168f952fea9d8e
-
SHA1
8a7612b99dad36da3a88bdf9ce888de19a9c2be1
-
SHA256
ca6e08d293d450577e851f2802190871e5eff5e0de36915151f63f421eaeaf13
-
SHA512
a1748f0e12c3882783e92093c6198dd9b958fa4099ef69d3f734fa8768c3c114da5a80d25a3419adb7f9735832b4ab402a3b03a22eab85949622dec991cf3bc2
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-