General
-
Target
IMG50063065.pif.exe
-
Size
1.2MB
-
Sample
220827-ayhasscfg3
-
MD5
b1ebf9a17fd043323203f7b7ce7b5723
-
SHA1
6b8111febaa3376fa44e6ed415dc947884e57b34
-
SHA256
3322b19106784923e2ddca902b4dbcb5b45724df974cccfd943c435b778c1cc0
-
SHA512
f1151a2888b0841d981f9a540a4863ccc54de24039a9bcdfc439986722a57e020f8d0b559d713d5ab3e836ed8a93651d83dc8fe7f1420e497444f490e36bc30a
-
SSDEEP
24576:HmeNfdhdkhFXFQRUDcgvhdaMPe858oN357XOf3z3woEY:HPfKHFQCDZnag58ohxXo3zw
Static task
static1
Behavioral task
behavioral1
Sample
IMG50063065.pif.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IMG50063065.pif.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
netwire
augtolife.serveftp.com:500
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
sep
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
IMG50063065.pif.exe
-
Size
1.2MB
-
MD5
b1ebf9a17fd043323203f7b7ce7b5723
-
SHA1
6b8111febaa3376fa44e6ed415dc947884e57b34
-
SHA256
3322b19106784923e2ddca902b4dbcb5b45724df974cccfd943c435b778c1cc0
-
SHA512
f1151a2888b0841d981f9a540a4863ccc54de24039a9bcdfc439986722a57e020f8d0b559d713d5ab3e836ed8a93651d83dc8fe7f1420e497444f490e36bc30a
-
SSDEEP
24576:HmeNfdhdkhFXFQRUDcgvhdaMPe858oN357XOf3z3woEY:HPfKHFQCDZnag58ohxXo3zw
Score10/10-
NetWire RAT payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-