General
-
Target
a9189b815c696214f9c7297e0ee9d6ecfff9bcf7e7064651dc3d64522d922b8d
-
Size
869KB
-
Sample
240226-147qrahf52
-
MD5
996fd0a78c7ca69f0f5e2beecb9fb1c4
-
SHA1
0c7a6da13a2e59fd9d1932f7c365a367a957745d
-
SHA256
a9189b815c696214f9c7297e0ee9d6ecfff9bcf7e7064651dc3d64522d922b8d
-
SHA512
e48e6cc71d9046c92fb092c843d38a107b951ba300941cf22f08c1bac4d553900312ef530a8110136349a39ccc3c99ddf036bde9de9951c42098d91b92f45621
-
SSDEEP
24576:QmRwOiAUVxhgnMtPRNT4eDc4Qv4n4DS0I2io2JYgR:QMfOxP7T4eo4K4n7AH4
Static task
static1
Behavioral task
behavioral1
Sample
a9189b815c696214f9c7297e0ee9d6ecfff9bcf7e7064651dc3d64522d922b8d.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
saturdaylivecheckthisout.duckdns.org:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
mutex
hPWLUfVE
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
a9189b815c696214f9c7297e0ee9d6ecfff9bcf7e7064651dc3d64522d922b8d
-
Size
869KB
-
MD5
996fd0a78c7ca69f0f5e2beecb9fb1c4
-
SHA1
0c7a6da13a2e59fd9d1932f7c365a367a957745d
-
SHA256
a9189b815c696214f9c7297e0ee9d6ecfff9bcf7e7064651dc3d64522d922b8d
-
SHA512
e48e6cc71d9046c92fb092c843d38a107b951ba300941cf22f08c1bac4d553900312ef530a8110136349a39ccc3c99ddf036bde9de9951c42098d91b92f45621
-
SSDEEP
24576:QmRwOiAUVxhgnMtPRNT4eDc4Qv4n4DS0I2io2JYgR:QMfOxP7T4eo4K4n7AH4
-
NetWire RAT payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-