General
-
Target
0b67466b6fb798275ad9f6b08dfe0e20
-
Size
648KB
-
Sample
231230-crn6wadbh2
-
MD5
0b67466b6fb798275ad9f6b08dfe0e20
-
SHA1
c3e1e2036a5057a203135dc3980877274191d97e
-
SHA256
ef9fe3133e51c6e21dc43976a7e02392e219645091ac9e05bf0ebd6e4fbb857d
-
SHA512
143d6b8edc1fdc90c88cddd4b7061cd6fdcf075257a4a6eaf8b0b049805ed1a4ab0b8e63d9d83025fffea68ebb4b91e748330fa099958d883b1ebd966c0a0427
-
SSDEEP
12288:jc9VYM7klPqRLgTRZkdOVrPEBXDXI1KOHVVwPzQlhWDp0aaryS37u:jaVYMQyL4RZkds7aTXiKOHVWPWEDyaUu
Behavioral task
behavioral1
Sample
0b67466b6fb798275ad9f6b08dfe0e20.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
155.94.198.169:9112
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Corona-Virus
-
install_path
%AppData%\Install\offiice365.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Pounds
-
registry_autorun
true
-
startup_name
officeii365
-
use_mutex
false
Targets
-
-
Target
0b67466b6fb798275ad9f6b08dfe0e20
-
Size
648KB
-
MD5
0b67466b6fb798275ad9f6b08dfe0e20
-
SHA1
c3e1e2036a5057a203135dc3980877274191d97e
-
SHA256
ef9fe3133e51c6e21dc43976a7e02392e219645091ac9e05bf0ebd6e4fbb857d
-
SHA512
143d6b8edc1fdc90c88cddd4b7061cd6fdcf075257a4a6eaf8b0b049805ed1a4ab0b8e63d9d83025fffea68ebb4b91e748330fa099958d883b1ebd966c0a0427
-
SSDEEP
12288:jc9VYM7klPqRLgTRZkdOVrPEBXDXI1KOHVVwPzQlhWDp0aaryS37u:jaVYMQyL4RZkds7aTXiKOHVWPWEDyaUu
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-