General
-
Target
7851ea8d5fc704d4cb707c6993a4c8d9
-
Size
829KB
-
Sample
240126-y961asfcbn
-
MD5
7851ea8d5fc704d4cb707c6993a4c8d9
-
SHA1
fb69cf1f4fe935608e9ab76d00b74425348a3115
-
SHA256
d63c425c4f7130cf8213c9c7b8fb8102e309688ad1f4acf7cc37d4aec7820977
-
SHA512
49f17a821a3c35ed51232a3c1f7b570a64f6119ca0cbc4e0674515851f0f6866ab2c78aa2b3cc4be3ea397a8cdda9939646684f46c40d78ec94ba64a637241a6
-
SSDEEP
12288:OK2mhAMJ/cPlwG2dHpEfW4x5kGB6Ayz6G+MhlrreJA+LmbdjY07+bn1hf3rU6OGm:f2O/Gl6dpEfWLGahwmxhKbH3rUO46GBF
Static task
static1
Behavioral task
behavioral1
Sample
7851ea8d5fc704d4cb707c6993a4c8d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7851ea8d5fc704d4cb707c6993a4c8d9.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
netwire
185.244.30.120:4066
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Nov12345
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
7851ea8d5fc704d4cb707c6993a4c8d9
-
Size
829KB
-
MD5
7851ea8d5fc704d4cb707c6993a4c8d9
-
SHA1
fb69cf1f4fe935608e9ab76d00b74425348a3115
-
SHA256
d63c425c4f7130cf8213c9c7b8fb8102e309688ad1f4acf7cc37d4aec7820977
-
SHA512
49f17a821a3c35ed51232a3c1f7b570a64f6119ca0cbc4e0674515851f0f6866ab2c78aa2b3cc4be3ea397a8cdda9939646684f46c40d78ec94ba64a637241a6
-
SSDEEP
12288:OK2mhAMJ/cPlwG2dHpEfW4x5kGB6Ayz6G+MhlrreJA+LmbdjY07+bn1hf3rU6OGm:f2O/Gl6dpEfWLGahwmxhKbH3rUO46GBF
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-