General
-
Target
a2a0aa207be61aa7629ec65e93107316.exe
-
Size
640KB
-
Sample
221201-l3z7ysbh7v
-
MD5
a2a0aa207be61aa7629ec65e93107316
-
SHA1
f3a582a9aff6e53d7746d6a4ee91dfe7f7ccdb76
-
SHA256
93e9e0b438bfaa0c8c140019adb0f683d7c9cf068b900fe9ce3ee319daa4071a
-
SHA512
f4e9f4abc485b9fe7fb9ab11302f4c4c40c38ba53cfabb6229f6430adb7201d87d4d763139a7da0be412d8db39f46e196dd52985df4905f2407e3b60caa1a653
-
SSDEEP
12288:jwciJ0Bke2A0uI+87nj9UsG2P5xFfPtIgQQoz0hR2H9jq:60S5AdIvj91B5xF3aZ54hRE9j
Static task
static1
Behavioral task
behavioral1
Sample
a2a0aa207be61aa7629ec65e93107316.exe
Resource
win7-20221111-en
Malware Config
Extracted
netwire
podzeye2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
a2a0aa207be61aa7629ec65e93107316.exe
-
Size
640KB
-
MD5
a2a0aa207be61aa7629ec65e93107316
-
SHA1
f3a582a9aff6e53d7746d6a4ee91dfe7f7ccdb76
-
SHA256
93e9e0b438bfaa0c8c140019adb0f683d7c9cf068b900fe9ce3ee319daa4071a
-
SHA512
f4e9f4abc485b9fe7fb9ab11302f4c4c40c38ba53cfabb6229f6430adb7201d87d4d763139a7da0be412d8db39f46e196dd52985df4905f2407e3b60caa1a653
-
SSDEEP
12288:jwciJ0Bke2A0uI+87nj9UsG2P5xFfPtIgQQoz0hR2H9jq:60S5AdIvj91B5xF3aZ54hRE9j
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-