General
-
Target
b4cddfde06d2865b8a9159257a306956
-
Size
1.1MB
-
Sample
240305-qpkmkafg8x
-
MD5
b4cddfde06d2865b8a9159257a306956
-
SHA1
8442d322f8b3a4867a2e0b0a8bfdcb0d6f027b43
-
SHA256
36acfd31af173ab9a7d9daf6dd7eaa29efc19cddd492847111f5cd0554db88b6
-
SHA512
08531ce7812b1fad7d5009d7ce4eeb8eed9c10d877aaed45af75b8a7110c40041a3a984de9d0534ad5386279ab53ebfc4137850a6a64882d15194dd8992dcb0c
-
SSDEEP
24576:1AOcZuj86SEqPGdvf6AH7bxk9ilugRp3fO+veit:/h86SEn9fDIiluQzt
Static task
static1
Behavioral task
behavioral1
Sample
b4cddfde06d2865b8a9159257a306956.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4cddfde06d2865b8a9159257a306956.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
harold.ns01.info:3606
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Netwir
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
pHJVBoFH
-
offline_keylogger
true
-
password
master12
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
b4cddfde06d2865b8a9159257a306956
-
Size
1.1MB
-
MD5
b4cddfde06d2865b8a9159257a306956
-
SHA1
8442d322f8b3a4867a2e0b0a8bfdcb0d6f027b43
-
SHA256
36acfd31af173ab9a7d9daf6dd7eaa29efc19cddd492847111f5cd0554db88b6
-
SHA512
08531ce7812b1fad7d5009d7ce4eeb8eed9c10d877aaed45af75b8a7110c40041a3a984de9d0534ad5386279ab53ebfc4137850a6a64882d15194dd8992dcb0c
-
SSDEEP
24576:1AOcZuj86SEqPGdvf6AH7bxk9ilugRp3fO+veit:/h86SEn9fDIiluQzt
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-