General
-
Target
5d49247f8c540ca33d86c8369445a27f
-
Size
595KB
-
Sample
240115-rjae3shcen
-
MD5
5d49247f8c540ca33d86c8369445a27f
-
SHA1
8e66223b5f8c02eedd69e43ad848a5b46bcfc675
-
SHA256
2ec9ce0b1a74f80f6a568399b603037c2956d7baf5ade818c45a62b2aefe8314
-
SHA512
7b34894b29a82770f84511ce8fd90ba1b674fe062b2508dd251246b20056f1b319dae464515c35ae8c58db79bf54c2d8985b5f68b687c19cd2cf6973fe38572f
-
SSDEEP
12288:eJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuI:WirCkUo8fLBqmze9pS4a7qu9VdMkbIM0
Behavioral task
behavioral1
Sample
5d49247f8c540ca33d86c8369445a27f.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
automan.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
5d49247f8c540ca33d86c8369445a27f
-
Size
595KB
-
MD5
5d49247f8c540ca33d86c8369445a27f
-
SHA1
8e66223b5f8c02eedd69e43ad848a5b46bcfc675
-
SHA256
2ec9ce0b1a74f80f6a568399b603037c2956d7baf5ade818c45a62b2aefe8314
-
SHA512
7b34894b29a82770f84511ce8fd90ba1b674fe062b2508dd251246b20056f1b319dae464515c35ae8c58db79bf54c2d8985b5f68b687c19cd2cf6973fe38572f
-
SSDEEP
12288:eJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuI:WirCkUo8fLBqmze9pS4a7qu9VdMkbIM0
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-