General
-
Target
PO_6733.exe
-
Size
719KB
-
Sample
230125-md65msff95
-
MD5
76218662ffd8397441fadb34d12de1cc
-
SHA1
6432944d6cb7e5acc434d8d7a017c2ae6c21b426
-
SHA256
7a0c3008b65ed5033cc3663e9104ed7b39707c2a073ef3626549e0acd64f15f2
-
SHA512
3797d6d25f877f2cfcfa57b4a6ba1a3087f557314b684f78d8c72f53acdde71df7653c99603f3e683b8a2ad8d0a5c8615d9eaa165358d5bb19212d2007ad8d17
-
SSDEEP
12288:Frp6gxML2DQ8iFoFEyK0xlDxjIWD7+j3c1z3tTm9OrncN6lcQBb:FrfxMXSCp0r6WmjM1z39AAn
Static task
static1
Behavioral task
behavioral1
Sample
PO_6733.exe
Resource
win7-20221111-en
Malware Config
Extracted
netwire
212.193.30.230:3363
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password@2
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
PO_6733.exe
-
Size
719KB
-
MD5
76218662ffd8397441fadb34d12de1cc
-
SHA1
6432944d6cb7e5acc434d8d7a017c2ae6c21b426
-
SHA256
7a0c3008b65ed5033cc3663e9104ed7b39707c2a073ef3626549e0acd64f15f2
-
SHA512
3797d6d25f877f2cfcfa57b4a6ba1a3087f557314b684f78d8c72f53acdde71df7653c99603f3e683b8a2ad8d0a5c8615d9eaa165358d5bb19212d2007ad8d17
-
SSDEEP
12288:Frp6gxML2DQ8iFoFEyK0xlDxjIWD7+j3c1z3tTm9OrncN6lcQBb:FrfxMXSCp0r6WmjM1z39AAn
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation