General
-
Target
a7c3d0d7bf75bb2e25b78cebab270fb6
-
Size
123KB
-
Sample
240227-axyw6acf3z
-
MD5
a7c3d0d7bf75bb2e25b78cebab270fb6
-
SHA1
8742ac04ab6ac6c89a2fa13b2c17d18055c33769
-
SHA256
13373ecd91432ffad9d13dc85c3614a19cbd57fc576bd968f0204ef1305b39cf
-
SHA512
f37a578053a697196a1e0d397d87bbd118b605976747222fd33a7f30ec4e63c9fb7ad48a137c3c475bf091ccb5b13144a0951bf9dc976f021e6db69ac639e86e
-
SSDEEP
3072:/4JmjzYxGn7iF4s3ft5UZmgI7Dgxess5lFE:AJmjzYx3QZm/pg
Static task
static1
Behavioral task
behavioral1
Sample
a7c3d0d7bf75bb2e25b78cebab270fb6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7c3d0d7bf75bb2e25b78cebab270fb6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
vbc.publicvm.com:1002
-
activex_autorun
true
-
activex_key
{TQ754744-WA00-XI0Y-FV50-NS8J107AI1YU}
-
copy_executable
false
-
delete_original
false
-
host_id
BetaBot
-
keylogger_dir
%AppData%\Windows\
-
lock_executable
true
-
mutex
GoNTDjNn
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Chrome
-
use_mutex
true
Targets
-
-
Target
a7c3d0d7bf75bb2e25b78cebab270fb6
-
Size
123KB
-
MD5
a7c3d0d7bf75bb2e25b78cebab270fb6
-
SHA1
8742ac04ab6ac6c89a2fa13b2c17d18055c33769
-
SHA256
13373ecd91432ffad9d13dc85c3614a19cbd57fc576bd968f0204ef1305b39cf
-
SHA512
f37a578053a697196a1e0d397d87bbd118b605976747222fd33a7f30ec4e63c9fb7ad48a137c3c475bf091ccb5b13144a0951bf9dc976f021e6db69ac639e86e
-
SSDEEP
3072:/4JmjzYxGn7iF4s3ft5UZmgI7Dgxess5lFE:AJmjzYx3QZm/pg
Score10/10-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-