General
-
Target
a582f8176c5f4becf5f95a563e9ec11a
-
Size
1.1MB
-
Sample
240226-fte8jadf89
-
MD5
a582f8176c5f4becf5f95a563e9ec11a
-
SHA1
a8b2fd3f57157cce4fe9442b8ffa53e15ca4820c
-
SHA256
bd62e723aff056a5f6dd9b9ece4f5ea4bae0a50cc3bdd5f4228fb265c2a96170
-
SHA512
b077839b7a01290ade4632342e20dcc2885036deccd0a32d685a99efd2abbfd6f29ce5739f2145d8d439f8816092ad73612a15263580f356d9d727a4d8099fb0
-
SSDEEP
24576:C/IrYNKOA92HBZ6d68BM5adAFJSfLPyNI:arrDAON
Static task
static1
Behavioral task
behavioral1
Sample
a582f8176c5f4becf5f95a563e9ec11a.exe
Resource
win7-20240220-en
Malware Config
Extracted
netwire
roban.giize.com:1604
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
a582f8176c5f4becf5f95a563e9ec11a
-
Size
1.1MB
-
MD5
a582f8176c5f4becf5f95a563e9ec11a
-
SHA1
a8b2fd3f57157cce4fe9442b8ffa53e15ca4820c
-
SHA256
bd62e723aff056a5f6dd9b9ece4f5ea4bae0a50cc3bdd5f4228fb265c2a96170
-
SHA512
b077839b7a01290ade4632342e20dcc2885036deccd0a32d685a99efd2abbfd6f29ce5739f2145d8d439f8816092ad73612a15263580f356d9d727a4d8099fb0
-
SSDEEP
24576:C/IrYNKOA92HBZ6d68BM5adAFJSfLPyNI:arrDAON
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-