General

  • Target

    tmp

  • Size

    166KB

  • MD5

    37035aa02a65b1b869898cb611d37686

  • SHA1

    bd9d62bac74de751f593df27d7ce4885d2bedf01

  • SHA256

    4c01cc3dd96c524054207f6b37a334c62549857f28c0286cc8dfc30b6d388e34

  • SHA512

    a7056d998dd6205518209529d71ec3221c36651474050ffe67c1356f72bc230cac055279dc13dba5e3458979a0e394499ef8cb20b02a357ccea02f1104e27655

  • SSDEEP

    3072:bOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvnoYMjMqqDvFfCZjx:bOTcK+NrRioGHlz8rz0i/ozQqqDvFfk1

Score
10/10

Malware Config

Extracted

Family

netwire

C2

needforrat.hopto.org:3360

needforrat.hopto.org:7777

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    qRhguWXi

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    Crack_Windows

  • use_mutex

    true

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • tmp
    .exe windows:4 windows x86 arch:x86

    4563c74acbd357d386b177e402b96ce4


    Code Sign

    Headers

    Imports

    Sections