General
-
Target
a7f19143d0f37e36c02e97ed0ab1888a
-
Size
393KB
-
Sample
240227-ck56tadh83
-
MD5
a7f19143d0f37e36c02e97ed0ab1888a
-
SHA1
6afcd4839e77779f5365cb6c73b011be97c517a6
-
SHA256
54ad88178f1d80e514010af297573dc1a0a88cc2a743509c279b4c251ecf425b
-
SHA512
751a1809c562d33ad5d08d65f8ea2ff5d18c3915cd8fad4ff12bb9f3738325fc0c56c21bec576ca88d22f4e1895424ea6571f7ef65e41d7a088576f60b35cdc7
-
SSDEEP
6144:2ZFV6YJoVLIW91ILonX9buxDNae0rMAZZV8mS2vS+44kgQj1nKh/AY6PuqjDobEU:ET6eoVH91nnX84vS+4qQNUhqjDoIYo8
Behavioral task
behavioral1
Sample
a7f19143d0f37e36c02e97ed0ab1888a.exe
Resource
win7-20240215-en
Malware Config
Extracted
netwire
155.94.198.169:9112
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Corona-Virus
-
install_path
%AppData%\Install\offiice365.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Pounds
-
registry_autorun
true
-
startup_name
officeii365
-
use_mutex
false
Targets
-
-
Target
a7f19143d0f37e36c02e97ed0ab1888a
-
Size
393KB
-
MD5
a7f19143d0f37e36c02e97ed0ab1888a
-
SHA1
6afcd4839e77779f5365cb6c73b011be97c517a6
-
SHA256
54ad88178f1d80e514010af297573dc1a0a88cc2a743509c279b4c251ecf425b
-
SHA512
751a1809c562d33ad5d08d65f8ea2ff5d18c3915cd8fad4ff12bb9f3738325fc0c56c21bec576ca88d22f4e1895424ea6571f7ef65e41d7a088576f60b35cdc7
-
SSDEEP
6144:2ZFV6YJoVLIW91ILonX9buxDNae0rMAZZV8mS2vS+44kgQj1nKh/AY6PuqjDobEU:ET6eoVH91nnX84vS+4qQNUhqjDoIYo8
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-