General
-
Target
3a063843b86882f4adc81ec1cdfb7bca
-
Size
594KB
-
Sample
231231-ryn7sahha8
-
MD5
3a063843b86882f4adc81ec1cdfb7bca
-
SHA1
cbeb7aed619982f754d79ad2fe44cd20280a0638
-
SHA256
cfc906e180861810f8d8a4b578116054ef6f84ab725196124af6450629c2c05a
-
SHA512
fc9ebfb8e183a0bad00f6bc28e999c69929eb545d5a7fd2b1803076137c3ffb89888dc8a4aca113182e35106b7d3f6fd6483cf8ae7752f3d5a2732329a8c045b
-
SSDEEP
12288:OJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuN:mirCkUo8fLBqmze9pS4a7qu9VdMkbIMZ
Behavioral task
behavioral1
Sample
3a063843b86882f4adc81ec1cdfb7bca.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
automan.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
3a063843b86882f4adc81ec1cdfb7bca
-
Size
594KB
-
MD5
3a063843b86882f4adc81ec1cdfb7bca
-
SHA1
cbeb7aed619982f754d79ad2fe44cd20280a0638
-
SHA256
cfc906e180861810f8d8a4b578116054ef6f84ab725196124af6450629c2c05a
-
SHA512
fc9ebfb8e183a0bad00f6bc28e999c69929eb545d5a7fd2b1803076137c3ffb89888dc8a4aca113182e35106b7d3f6fd6483cf8ae7752f3d5a2732329a8c045b
-
SSDEEP
12288:OJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuN:mirCkUo8fLBqmze9pS4a7qu9VdMkbIMZ
-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-