General
-
Target
RFQ 80479040.doc
-
Size
62KB
-
Sample
220930-ldq8radbd8
-
MD5
31c3a3ef341ada198075d57bf07cc03d
-
SHA1
d8ee2ef6d1066ce0fd1f95784c4381374d890adf
-
SHA256
b995f53ac55eb6ce01af25e1cc21f26bf182aaf97e7c09be062250bf8e5df4b6
-
SHA512
a00412dd6ecaa738b6a7c58b76e578bba9ae7fca4b475667fa6198822f094b88b253938fb9d8f5eb94a1da0fd0f84c513cbab52c06dbcaf0e39520b217301b42
-
SSDEEP
384:OkUgY5j96eYPKNiaI1WAE7OCb8iSUR/8dEv8krqrf4INzte/DZeIESy3uGjGWi2S:OP5I5I/q/qsfZ3qHGjG/owKSqXI
Behavioral task
behavioral1
Sample
RFQ 80479040.doc
Resource
win7-20220812-en
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
RFQ 80479040.doc
-
Size
62KB
-
MD5
31c3a3ef341ada198075d57bf07cc03d
-
SHA1
d8ee2ef6d1066ce0fd1f95784c4381374d890adf
-
SHA256
b995f53ac55eb6ce01af25e1cc21f26bf182aaf97e7c09be062250bf8e5df4b6
-
SHA512
a00412dd6ecaa738b6a7c58b76e578bba9ae7fca4b475667fa6198822f094b88b253938fb9d8f5eb94a1da0fd0f84c513cbab52c06dbcaf0e39520b217301b42
-
SSDEEP
384:OkUgY5j96eYPKNiaI1WAE7OCb8iSUR/8dEv8krqrf4INzte/DZeIESy3uGjGWi2S:OP5I5I/q/qsfZ3qHGjG/owKSqXI
-
NetWire RAT payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-