General
-
Target
NEAS.ecd280dc6ad1b0878cd5d78777480ad0.exe
-
Size
790KB
-
Sample
231026-g5g2yaef6z
-
MD5
ecd280dc6ad1b0878cd5d78777480ad0
-
SHA1
df7f96a08af5be575b603bca00ec9157d7e4e927
-
SHA256
ff4aab1d3514d2977affb92b3d856c5de43cbd8ab3958bcbb0d12bbd47919150
-
SHA512
0ac56204485267f07e1b6d2a90daf177bf5ec312bfdfa9b525b31565a17181600d5ebf7196d3015f137cdc80a83f1d233dbc24dc4e1d53d13b43969f501a4eb6
-
SSDEEP
24576:YBXY+ruBJ5antl8yYEcAwQ1nFN8LcGTsF:YOoneE90r2
Behavioral task
behavioral1
Sample
NEAS.ecd280dc6ad1b0878cd5d78777480ad0.exe
Resource
win7-20231023-en
Malware Config
Extracted
netwire
155.94.198.169:9112
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Corona-Virus
-
install_path
%AppData%\Install\offiice365.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Pounds
-
registry_autorun
true
-
startup_name
officeii365
-
use_mutex
false
Targets
-
-
Target
NEAS.ecd280dc6ad1b0878cd5d78777480ad0.exe
-
Size
790KB
-
MD5
ecd280dc6ad1b0878cd5d78777480ad0
-
SHA1
df7f96a08af5be575b603bca00ec9157d7e4e927
-
SHA256
ff4aab1d3514d2977affb92b3d856c5de43cbd8ab3958bcbb0d12bbd47919150
-
SHA512
0ac56204485267f07e1b6d2a90daf177bf5ec312bfdfa9b525b31565a17181600d5ebf7196d3015f137cdc80a83f1d233dbc24dc4e1d53d13b43969f501a4eb6
-
SSDEEP
24576:YBXY+ruBJ5antl8yYEcAwQ1nFN8LcGTsF:YOoneE90r2
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-