General
-
Target
04e96a27c8ae98f43ec0d31cb06ee44b
-
Size
485KB
-
Sample
231229-1r3ahahbck
-
MD5
04e96a27c8ae98f43ec0d31cb06ee44b
-
SHA1
b5c0777f701fe128f66ceccdc8b532703f34625c
-
SHA256
a659b12b3702908176e925fa920e42ff67435a60e025a608b52acd81f44e6f1e
-
SHA512
046b4582e9b6da839c035b3cc0deae34e57aff2b13207cfa6e5d8f68efe071f21104d4c7e75693604d55d0c17923724d9e0b517814ccc75d67090b9ad050a8aa
-
SSDEEP
6144:rSH+MbiH2r0uS11MMvEV9SlVwGP2b/xVz8I+1FudBFNc+186DClQ:rc+Mbip1BEV9o/2DuFyFNcWLDkQ
Static task
static1
Behavioral task
behavioral1
Sample
04e96a27c8ae98f43ec0d31cb06ee44b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04e96a27c8ae98f43ec0d31cb06ee44b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
netwire
warin.hopto.org:4320
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
04e96a27c8ae98f43ec0d31cb06ee44b
-
Size
485KB
-
MD5
04e96a27c8ae98f43ec0d31cb06ee44b
-
SHA1
b5c0777f701fe128f66ceccdc8b532703f34625c
-
SHA256
a659b12b3702908176e925fa920e42ff67435a60e025a608b52acd81f44e6f1e
-
SHA512
046b4582e9b6da839c035b3cc0deae34e57aff2b13207cfa6e5d8f68efe071f21104d4c7e75693604d55d0c17923724d9e0b517814ccc75d67090b9ad050a8aa
-
SSDEEP
6144:rSH+MbiH2r0uS11MMvEV9SlVwGP2b/xVz8I+1FudBFNc+186DClQ:rc+Mbip1BEV9o/2DuFyFNcWLDkQ
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-