General

  • Target

    58d02ed4bc010363facf162ac2976905.bin

  • Size

    51KB

  • MD5

    d8b77d90ce14c8970687cdb5ceef6244

  • SHA1

    95603a85d79441ad07d29f074e82cde855d04b91

  • SHA256

    56ebf05567c76a58d9556cf1f535ea7dd8d9fc3870ae47215739d9678ab6a872

  • SHA512

    90401b19ae77b523b1127bdf5b0c6a2bab57354802dd3e3e57096ff8d98e09f3bfca5c2d451fc059cd79bb096fbe2fac3a51383c761ce823fd1241d0322310c5

  • SSDEEP

    1536:uEflG7P3NI1bxRi0LikysrhjNY00Ygzrg:N9+Ej3jysrhjKVYgz0

Score
10/10

Malware Config

Extracted

Family

netwire

C2

majika.gotdns.ch:1120

nik.pointto.us:1120

nikouh.pointto.us:1120

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    naza

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    CVkJEjPx

  • offline_keylogger

    true

  • password

    vodka

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 58d02ed4bc010363facf162ac2976905.bin
    .zip

    Password: infected

  • 3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.exe
    .exe windows x86

    Password: infected

    4e6ba17721530f6e9a509b1380c99995


    Headers

    Imports

    Sections