General
-
Target
NEAS.d85f267d416aecc9ce02a394d7ae0050_JC.exe
-
Size
4.4MB
-
Sample
231028-eed69aeh79
-
MD5
d85f267d416aecc9ce02a394d7ae0050
-
SHA1
1d134c1cf5eb76c3f8917e7fab57d5c00c96d56f
-
SHA256
82fbdf9b5469406b50370f3d52fa410097b8b4a108c36cb0e8ef716e92190e93
-
SHA512
64578e73e578df6c94fa0514c5e159fc4338f31dfa6455a636d2819c347c13c250f09e94252c256fe3b506d1242258e42420a2095f9c1b829fb355a100ce3129
-
SSDEEP
98304:K2cPK8Qh71GAnlUxvawmWybJQAlbM0azCWtg04c5bc:lCKhhZGHCwBx2bazjtf5bc
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d85f267d416aecc9ce02a394d7ae0050_JC.exe
Resource
win7-20231023-en
Malware Config
Extracted
netwire
nl-amsterdam04.crypticvpn.com:8067
ru-moscow02.crypticvpn.com:8022
de-frankfurt03.crypticvpn.com:8022
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Zboub-%Rand%
-
keylogger_dir
%AppData%\Roaming\Microsoft\MMC\Logs\
-
lock_executable
false
-
mutex
oLTJRPxq
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
NEAS.d85f267d416aecc9ce02a394d7ae0050_JC.exe
-
Size
4.4MB
-
MD5
d85f267d416aecc9ce02a394d7ae0050
-
SHA1
1d134c1cf5eb76c3f8917e7fab57d5c00c96d56f
-
SHA256
82fbdf9b5469406b50370f3d52fa410097b8b4a108c36cb0e8ef716e92190e93
-
SHA512
64578e73e578df6c94fa0514c5e159fc4338f31dfa6455a636d2819c347c13c250f09e94252c256fe3b506d1242258e42420a2095f9c1b829fb355a100ce3129
-
SSDEEP
98304:K2cPK8Qh71GAnlUxvawmWybJQAlbM0azCWtg04c5bc:lCKhhZGHCwBx2bazjtf5bc
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-