General
-
Target
5bdd4de824d48d14df40bce7f7709ad1
-
Size
1.3MB
-
Sample
240115-cmt7bsfdej
-
MD5
5bdd4de824d48d14df40bce7f7709ad1
-
SHA1
8cc562f26e24660ad2f7a5e88e8172e7718e6bf8
-
SHA256
3afedea501a9bca64d1d400f5e3aa79e1f0d359a035d84569c123d49458425f2
-
SHA512
0d86196c36031429db86134c541fe86c800fcf83765b92b0a66c81e10774f26339dc905fa184107a3871c837fb1c1cb8b518409d0cef3bd3402de820db8c5cba
-
SSDEEP
24576:AAOcZwdf+OD0+t2drJGlFN5SoRS7NVzxYOKdfA/i6A3Xc6z1F/i4:efU8lJS7PKdo43M6z1F/V
Static task
static1
Behavioral task
behavioral1
Sample
5bdd4de824d48d14df40bce7f7709ad1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bdd4de824d48d14df40bce7f7709ad1.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
netwire
harold.ns01.info:3606
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Netwir
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
pHJVBoFH
-
offline_keylogger
true
-
password
master12
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
5bdd4de824d48d14df40bce7f7709ad1
-
Size
1.3MB
-
MD5
5bdd4de824d48d14df40bce7f7709ad1
-
SHA1
8cc562f26e24660ad2f7a5e88e8172e7718e6bf8
-
SHA256
3afedea501a9bca64d1d400f5e3aa79e1f0d359a035d84569c123d49458425f2
-
SHA512
0d86196c36031429db86134c541fe86c800fcf83765b92b0a66c81e10774f26339dc905fa184107a3871c837fb1c1cb8b518409d0cef3bd3402de820db8c5cba
-
SSDEEP
24576:AAOcZwdf+OD0+t2drJGlFN5SoRS7NVzxYOKdfA/i6A3Xc6z1F/i4:efU8lJS7PKdo43M6z1F/V
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-