General
-
Target
4eb5b6684c39595331f022a4265b8fb8.exe
-
Size
1.3MB
-
Sample
240109-xdsx5agbck
-
MD5
4eb5b6684c39595331f022a4265b8fb8
-
SHA1
5e90672889ecc1dd530d140ddb956f54c5be0f4b
-
SHA256
1006ff92e3892ac95548a7fc0764deeaa0078ff153dcd6053d889cf9aad19f4b
-
SHA512
96b9a874467b2bfe8d870c394c05793e69c1b63661558c0187b7cd8febab136c4fad191c3363299dad74da5806e5061ef8a6b83a93cd78c79f13e0b6d82871bf
-
SSDEEP
24576:lTevS/yMaon/yHrtV0VXDFGjwLS9NFJ/AWid8F/2f7FNRr:IogwLS9NFJ4Wi2F/2f7FN1
Static task
static1
Behavioral task
behavioral1
Sample
4eb5b6684c39595331f022a4265b8fb8.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
love82.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
OqvAvPni
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
4eb5b6684c39595331f022a4265b8fb8.exe
-
Size
1.3MB
-
MD5
4eb5b6684c39595331f022a4265b8fb8
-
SHA1
5e90672889ecc1dd530d140ddb956f54c5be0f4b
-
SHA256
1006ff92e3892ac95548a7fc0764deeaa0078ff153dcd6053d889cf9aad19f4b
-
SHA512
96b9a874467b2bfe8d870c394c05793e69c1b63661558c0187b7cd8febab136c4fad191c3363299dad74da5806e5061ef8a6b83a93cd78c79f13e0b6d82871bf
-
SSDEEP
24576:lTevS/yMaon/yHrtV0VXDFGjwLS9NFJ/AWid8F/2f7FNRr:IogwLS9NFJ4Wi2F/2f7FN1
-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-