General
-
Target
25794228f76b602cf9635438a838ae6a
-
Size
738KB
-
Sample
231231-dgvfkscgfj
-
MD5
25794228f76b602cf9635438a838ae6a
-
SHA1
cb078db4f8e8b8a498f7b3df4514733ecf3c9b30
-
SHA256
8d37d45f0232f9c17f9835102323087a6c0e17cf9f4fdc9ebf8cfb857fe14934
-
SHA512
fec5387df8c46bae11d1bd298f131120a7e98bfe285c1b96323efb28ba5c79d14c6437b8d16cdfe0f0d452cebfd10c675dfa1ccd493df2689990e8b6754f5783
-
SSDEEP
12288:mFdMaC02iNv4so1jj457rEfdF6OIrNLriLuscos26aq7NG18dWSnvn+ilBM6xk:wfC01uso1jG7rodViNUugsIqK8djf+OD
Static task
static1
Behavioral task
behavioral1
Sample
25794228f76b602cf9635438a838ae6a.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
harold.ns01.info:3606
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
prim
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
eApkLVIW
-
offline_keylogger
true
-
password
master12
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
25794228f76b602cf9635438a838ae6a
-
Size
738KB
-
MD5
25794228f76b602cf9635438a838ae6a
-
SHA1
cb078db4f8e8b8a498f7b3df4514733ecf3c9b30
-
SHA256
8d37d45f0232f9c17f9835102323087a6c0e17cf9f4fdc9ebf8cfb857fe14934
-
SHA512
fec5387df8c46bae11d1bd298f131120a7e98bfe285c1b96323efb28ba5c79d14c6437b8d16cdfe0f0d452cebfd10c675dfa1ccd493df2689990e8b6754f5783
-
SSDEEP
12288:mFdMaC02iNv4so1jj457rEfdF6OIrNLriLuscos26aq7NG18dWSnvn+ilBM6xk:wfC01uso1jG7rodViNUugsIqK8djf+OD
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-