General
-
Target
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77
-
Size
1.1MB
-
Sample
230129-yej72sbc24
-
MD5
4cebadb09cb1c3823c181fddb594bfac
-
SHA1
4398791a02dcfbe616a63f68d1bb3721e51d071e
-
SHA256
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77
-
SHA512
ea6502cc39d5e83411db629820f9c43c20876bd4554bf2f8f80ba79f6372552486c09693a6a416aaa1d1d5325c2cf33437b888d022398785eb69a58759372bcc
-
SSDEEP
12288:LRG7xFeew+B6PVaJvEUNItZTWtAFpnxkhwIBlEvbkE3BAUVwUU9SlqjQt8MpsPTU:UlJvEUNeWapn+aIBlEvYIbKbcIAIT
Behavioral task
behavioral1
Sample
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe
Resource
win7-20221111-en
Malware Config
Extracted
netwire
bedahogs.100chickens.me:6065
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Msc.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
ABsbWEPM
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
MscRun
-
use_mutex
true
Targets
-
-
Target
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77
-
Size
1.1MB
-
MD5
4cebadb09cb1c3823c181fddb594bfac
-
SHA1
4398791a02dcfbe616a63f68d1bb3721e51d071e
-
SHA256
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77
-
SHA512
ea6502cc39d5e83411db629820f9c43c20876bd4554bf2f8f80ba79f6372552486c09693a6a416aaa1d1d5325c2cf33437b888d022398785eb69a58759372bcc
-
SSDEEP
12288:LRG7xFeew+B6PVaJvEUNItZTWtAFpnxkhwIBlEvbkE3BAUVwUU9SlqjQt8MpsPTU:UlJvEUNeWapn+aIBlEvYIbKbcIAIT
-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-