General
-
Target
58486d0322d15db4d9302a47227c90e11b16eefc0b7b583199e0a5cd47c686ba
-
Size
411KB
-
Sample
221127-mx2n9sfb3y
-
MD5
8e07c0c848eb45f051bf5b5b9fa9342b
-
SHA1
94c6ef17ab992c825899776ab1b43ae581d78ad5
-
SHA256
58486d0322d15db4d9302a47227c90e11b16eefc0b7b583199e0a5cd47c686ba
-
SHA512
5a337108b6189bfbb36741549cfcafbb7680f74cb786c6c4cfe0c2423a6411e7ad0acff95420b084a5e82acff17a4244c9dff666785498b77ba2d87be57fd9f3
-
SSDEEP
6144:PPxPf8mAyvJcMT4zB60JMVJos3flLzuBhFpFW2RT/Bo6BGWH0Vi5nTQTaWbvEX4U:PPjAyiicVjs93uL3Ft7o4LHJpTR4I1
Static task
static1
Behavioral task
behavioral1
Sample
vMail_39480.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
vMail_39480.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
vMail_39480.exe
-
Size
470KB
-
MD5
67708909977b3ec3d3038863535b6ed5
-
SHA1
64e80a4d3430f9f5b356067688ef9d07c3efa497
-
SHA256
4a3a2ac49bdd4c12ead7079ade8ee18fa9b6e66f07dcca8a40c7398d611f6fe1
-
SHA512
baa0d305102473d91ffcefa9fd58dac56487acf13034a233345e69c127c0c67b51890db98f5477ab7c96085d84d506bb19549fcdd2f96332ad8ea66cf765ffe3
-
SSDEEP
6144:w3IxPgjy5gaC/Cz3twFitux975DEtd1oYOp4ztXAIQpLpWJ8jb5iBuaGv9auwErX:dkyt3thtux9GH5qywE8nImlauwE93Us
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-