General
-
Target
84b14ea31625a08d6e8573a9a0c9ebb3
-
Size
824KB
-
Sample
240131-r5stjsgcdn
-
MD5
84b14ea31625a08d6e8573a9a0c9ebb3
-
SHA1
ee0e1faeb7dced32e7a8460d996cdfe08dfc3cdd
-
SHA256
a73a4e8cd40628ead3c5a597128a98797fe4c8fef809fb0e42c1fdc13924f4f3
-
SHA512
01e9ec4e4c6b65fc723815b402bd914cdf7bec96b39e3ec5eeb9b58b261fe631887486a37fc88f0e776eb286ac0e98881eb6ed0c225aed90000ec2e6e2de2879
-
SSDEEP
24576:mKB7hdynuOwvf3aDtOWT3WWedvss7mo5oFCEkv:hBWnu93+OWT3W7dkiosv
Static task
static1
Behavioral task
behavioral1
Sample
84b14ea31625a08d6e8573a9a0c9ebb3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
84b14ea31625a08d6e8573a9a0c9ebb3.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
netwire
night90.ddns.net:8999
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
New-stub
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
soHOGwSb
-
offline_keylogger
true
-
password
teamoluwa1
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
84b14ea31625a08d6e8573a9a0c9ebb3
-
Size
824KB
-
MD5
84b14ea31625a08d6e8573a9a0c9ebb3
-
SHA1
ee0e1faeb7dced32e7a8460d996cdfe08dfc3cdd
-
SHA256
a73a4e8cd40628ead3c5a597128a98797fe4c8fef809fb0e42c1fdc13924f4f3
-
SHA512
01e9ec4e4c6b65fc723815b402bd914cdf7bec96b39e3ec5eeb9b58b261fe631887486a37fc88f0e776eb286ac0e98881eb6ed0c225aed90000ec2e6e2de2879
-
SSDEEP
24576:mKB7hdynuOwvf3aDtOWT3WWedvss7mo5oFCEkv:hBWnu93+OWT3W7dkiosv
-
NetWire RAT payload
-
Suspicious use of SetThreadContext
-