General
-
Target
37035aa02a65b1b869898cb611d37686
-
Size
166KB
-
Sample
231231-p7vd2sgbf8
-
MD5
37035aa02a65b1b869898cb611d37686
-
SHA1
bd9d62bac74de751f593df27d7ce4885d2bedf01
-
SHA256
4c01cc3dd96c524054207f6b37a334c62549857f28c0286cc8dfc30b6d388e34
-
SHA512
a7056d998dd6205518209529d71ec3221c36651474050ffe67c1356f72bc230cac055279dc13dba5e3458979a0e394499ef8cb20b02a357ccea02f1104e27655
-
SSDEEP
3072:bOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvnoYMjMqqDvFfCZjx:bOTcK+NrRioGHlz8rz0i/ozQqqDvFfk1
Behavioral task
behavioral1
Sample
37035aa02a65b1b869898cb611d37686.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37035aa02a65b1b869898cb611d37686.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
netwire
needforrat.hopto.org:3360
needforrat.hopto.org:7777
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
qRhguWXi
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Crack_Windows
-
use_mutex
true
Targets
-
-
Target
37035aa02a65b1b869898cb611d37686
-
Size
166KB
-
MD5
37035aa02a65b1b869898cb611d37686
-
SHA1
bd9d62bac74de751f593df27d7ce4885d2bedf01
-
SHA256
4c01cc3dd96c524054207f6b37a334c62549857f28c0286cc8dfc30b6d388e34
-
SHA512
a7056d998dd6205518209529d71ec3221c36651474050ffe67c1356f72bc230cac055279dc13dba5e3458979a0e394499ef8cb20b02a357ccea02f1104e27655
-
SSDEEP
3072:bOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvnoYMjMqqDvFfCZjx:bOTcK+NrRioGHlz8rz0i/ozQqqDvFfk1
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-