General
-
Target
496472b169b3391d0ab74b4c0e90323b
-
Size
547KB
-
Sample
231226-bwc4qscff4
-
MD5
496472b169b3391d0ab74b4c0e90323b
-
SHA1
6effc911e99f79f37f26fd362b863e6432ee3a17
-
SHA256
916b29893883170338ebfbfbfc0d6161fa262a7b6f13d6a8ad74c8a1cd46395f
-
SHA512
ccd2e576273e3df44c049b65c6b1b7948f142c5dc573b0f30b97c0f65e8e1d1c0ef7dfb5d581fd6dbc9e7f517b125fe72e771db3abaf77f869b997a854664c54
-
SSDEEP
12288:XfcLDGoTfMLiJOfjYcSauWQOuT4vRTqZ+740RWJ:0XvJOuaxQLqNqIRRWJ
Static task
static1
Behavioral task
behavioral1
Sample
496472b169b3391d0ab74b4c0e90323b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
496472b169b3391d0ab74b4c0e90323b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
netwire
warin.hopto.org:4320
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
496472b169b3391d0ab74b4c0e90323b
-
Size
547KB
-
MD5
496472b169b3391d0ab74b4c0e90323b
-
SHA1
6effc911e99f79f37f26fd362b863e6432ee3a17
-
SHA256
916b29893883170338ebfbfbfc0d6161fa262a7b6f13d6a8ad74c8a1cd46395f
-
SHA512
ccd2e576273e3df44c049b65c6b1b7948f142c5dc573b0f30b97c0f65e8e1d1c0ef7dfb5d581fd6dbc9e7f517b125fe72e771db3abaf77f869b997a854664c54
-
SSDEEP
12288:XfcLDGoTfMLiJOfjYcSauWQOuT4vRTqZ+740RWJ:0XvJOuaxQLqNqIRRWJ
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-