General
-
Target
f53b326524216118f4f997a48e1068c5.exe.vir
-
Size
1.2MB
-
Sample
221210-esc64seh59
-
MD5
823f9666a023501d18d4355d7d7fb5f2
-
SHA1
3bbbf2098ca43498859177bbbed140b16e9f38c7
-
SHA256
660571ecc23b7922c5f68ca883acef3066875c6080fef433f57e932104df8903
-
SHA512
7c88f4b4286c8e419280959b207291ea2f31355c781cd7135db9b359d3d9aeb2742611ae8a7c1de3f38a013bf9b9f0ad34ebb5a125bb591bcca044098a8571fc
-
SSDEEP
24576:5AOcZ3ZnyNAhoE6uZ1B4tv3GKYBg7ebRYBpcfNGrifbsgqP/F16:zyraElevX70RvgrCsgo/76
Static task
static1
Behavioral task
behavioral1
Sample
f53b326524216118f4f997a48e1068c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f53b326524216118f4f997a48e1068c5.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
netwire
reportss.duckdns.org:4411
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
f53b326524216118f4f997a48e1068c5.exe.vir
-
Size
1.2MB
-
MD5
823f9666a023501d18d4355d7d7fb5f2
-
SHA1
3bbbf2098ca43498859177bbbed140b16e9f38c7
-
SHA256
660571ecc23b7922c5f68ca883acef3066875c6080fef433f57e932104df8903
-
SHA512
7c88f4b4286c8e419280959b207291ea2f31355c781cd7135db9b359d3d9aeb2742611ae8a7c1de3f38a013bf9b9f0ad34ebb5a125bb591bcca044098a8571fc
-
SSDEEP
24576:5AOcZ3ZnyNAhoE6uZ1B4tv3GKYBg7ebRYBpcfNGrifbsgqP/F16:zyraElevX70RvgrCsgo/76
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-