General
-
Target
d45cee4ebe54ec8e3c1402d81c4fa12b
-
Size
395KB
-
Sample
231220-sm57ladael
-
MD5
d45cee4ebe54ec8e3c1402d81c4fa12b
-
SHA1
19e9f9a7566555a0f724e60d012fa4f09d7977d2
-
SHA256
5be4a454380c91491b83fe66a860aec686f0a48e364a39e02d5a714ac02b10cd
-
SHA512
fd9b774a8b98dbc237002d3ca5d6b6776594111602d79486b56a620c64bffcba5f158ac0680450bdfa497bc4a2c2442f6e68304372d15a087386859265bbeccc
-
SSDEEP
6144:eu125eUHCRnz4PfLjBW7ngCnxuTVLbjCGDQ27Zem23:7Eev0XBWL9adbjCoRZet3
Static task
static1
Behavioral task
behavioral1
Sample
d45cee4ebe54ec8e3c1402d81c4fa12b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d45cee4ebe54ec8e3c1402d81c4fa12b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
netwire
ijomsdavis1.ddns.net:3535
-
activex_autorun
true
-
activex_key
{84773QKA-6V24-1HK1-S828-6S1303434D0S}
-
copy_executable
true
-
delete_original
false
-
host_id
CASHOUT
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
dswjuGgD
-
offline_keylogger
true
-
password
teamoluwa1
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
d45cee4ebe54ec8e3c1402d81c4fa12b
-
Size
395KB
-
MD5
d45cee4ebe54ec8e3c1402d81c4fa12b
-
SHA1
19e9f9a7566555a0f724e60d012fa4f09d7977d2
-
SHA256
5be4a454380c91491b83fe66a860aec686f0a48e364a39e02d5a714ac02b10cd
-
SHA512
fd9b774a8b98dbc237002d3ca5d6b6776594111602d79486b56a620c64bffcba5f158ac0680450bdfa497bc4a2c2442f6e68304372d15a087386859265bbeccc
-
SSDEEP
6144:eu125eUHCRnz4PfLjBW7ngCnxuTVLbjCGDQ27Zem23:7Eev0XBWL9adbjCoRZet3
Score10/10-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-