General
-
Target
5c1a933f916891911ab6d69a65d0d855
-
Size
576KB
-
Sample
240115-es5lcsaah4
-
MD5
5c1a933f916891911ab6d69a65d0d855
-
SHA1
37aa46c9b8d8e9475d6029d57be31f47409d4726
-
SHA256
82137775a74b4ee9456e1fc73e4dc89f78d25dee1c4d3990df95570124ad439b
-
SHA512
2f3b63ef9341d467ed6e4c76152460620ec92a2996881f6f8f6cc6660ddcfa3bca66fd07d6a76dd0cea5210327c5a875442e7e295e7bd474ead7c148538aac8b
-
SSDEEP
12288:Irf0P3HD5Y+nvGtCsA/Rm2UGWGMqY2u3WUmVKeWe:XP3H1YEvzAAcW7KeF
Static task
static1
Behavioral task
behavioral1
Sample
5c1a933f916891911ab6d69a65d0d855.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c1a933f916891911ab6d69a65d0d855.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
netwire
warin.hopto.org:4320
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
5c1a933f916891911ab6d69a65d0d855
-
Size
576KB
-
MD5
5c1a933f916891911ab6d69a65d0d855
-
SHA1
37aa46c9b8d8e9475d6029d57be31f47409d4726
-
SHA256
82137775a74b4ee9456e1fc73e4dc89f78d25dee1c4d3990df95570124ad439b
-
SHA512
2f3b63ef9341d467ed6e4c76152460620ec92a2996881f6f8f6cc6660ddcfa3bca66fd07d6a76dd0cea5210327c5a875442e7e295e7bd474ead7c148538aac8b
-
SSDEEP
12288:Irf0P3HD5Y+nvGtCsA/Rm2UGWGMqY2u3WUmVKeWe:XP3H1YEvzAAcW7KeF
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-