General
-
Target
dce630587d764f269da604a1f3637b99
-
Size
305KB
-
Sample
231222-s37qcsacej
-
MD5
dce630587d764f269da604a1f3637b99
-
SHA1
f8055d5c3f54a76db454be3c47e7c6452e7e05d0
-
SHA256
f4847c104fe539b564332b0a7a3ab3d83c046335a9ef7ce700d921b67834c249
-
SHA512
d3e8a357cc33694419813c3dfd29d5d30dfa2cbf96c6f3935808d1a29db07d7ef2412d605011ce708b4271d6e59e4929f654701c07e1c1597208102404811313
-
SSDEEP
6144:LHPhCICIBLCTodEEOYchRR5TCwMQLva+StyYKU/WuH:FGfxnvCwTD5U/Wu
Static task
static1
Behavioral task
behavioral1
Sample
dce630587d764f269da604a1f3637b99.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
bright1.awsmppl.com:4770
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
dce630587d764f269da604a1f3637b99
-
Size
305KB
-
MD5
dce630587d764f269da604a1f3637b99
-
SHA1
f8055d5c3f54a76db454be3c47e7c6452e7e05d0
-
SHA256
f4847c104fe539b564332b0a7a3ab3d83c046335a9ef7ce700d921b67834c249
-
SHA512
d3e8a357cc33694419813c3dfd29d5d30dfa2cbf96c6f3935808d1a29db07d7ef2412d605011ce708b4271d6e59e4929f654701c07e1c1597208102404811313
-
SSDEEP
6144:LHPhCICIBLCTodEEOYchRR5TCwMQLva+StyYKU/WuH:FGfxnvCwTD5U/Wu
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-