Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f843b4d0ab8c3fd3eda5991b9521fd0d.exe
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
f843b4d0ab8c3fd3eda5991b9521fd0d.exe
-
Size
1007KB
-
MD5
f843b4d0ab8c3fd3eda5991b9521fd0d
-
SHA1
000fdbefcf5cdd837ff0386817c5965c80ae880c
-
SHA256
67aad5a6b746230f56aefe03cd16e2738cc5422536601483631732b3af8fd4c9
-
SHA512
2e9ec0da3c1c7797b54836af96fd1d352cd14a0dce8d478fae21a9820887909192681d7eadf08099c55927ccfd2f1642077367d13558b57b935771081ebc201d
-
SSDEEP
6144:q2hFHKRsR0OudRUJ7b+d/hdNH0eQZoALkjwoEuJfio46q:q2h9VKK7b2ln/pJfr
Malware Config
Extracted
Family
netwire
C2
netnetwir.duckdns.org:26661
netw.covid19.co.no:26661
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
netw-%dhjetor%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
qw12qw12
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2496-1-0x0000000000400000-0x00000000004FF000-memory.dmp netwire behavioral2/memory/2496-4-0x0000000000400000-0x00000000004FF000-memory.dmp netwire behavioral2/memory/2496-11-0x0000000000400000-0x00000000004FF000-memory.dmp netwire