General
-
Target
ba10854657d0090ce097a298f46c8abe
-
Size
597KB
-
Sample
240308-av894sbd5v
-
MD5
ba10854657d0090ce097a298f46c8abe
-
SHA1
d93da0f1be71cd78cff28369528123a1f1f4e34d
-
SHA256
edcc80df05e3645c7f44345c9e62603bc4a6ad83dfaf048e57722125ae7d5dd5
-
SHA512
4f5981923f480dd33dd29a64878de9b555199a12a87124a605ab740a0244e515835e023622e551177deef43e646aecf73e8b0f40bb4ad53e054c733fb3ffaf3f
-
SSDEEP
12288:wJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuy:MirCkUo8fLBqmze9pS4a7qu9VdMkbIMe
Behavioral task
behavioral1
Sample
ba10854657d0090ce097a298f46c8abe.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
automan.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
ba10854657d0090ce097a298f46c8abe
-
Size
597KB
-
MD5
ba10854657d0090ce097a298f46c8abe
-
SHA1
d93da0f1be71cd78cff28369528123a1f1f4e34d
-
SHA256
edcc80df05e3645c7f44345c9e62603bc4a6ad83dfaf048e57722125ae7d5dd5
-
SHA512
4f5981923f480dd33dd29a64878de9b555199a12a87124a605ab740a0244e515835e023622e551177deef43e646aecf73e8b0f40bb4ad53e054c733fb3ffaf3f
-
SSDEEP
12288:wJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuy:MirCkUo8fLBqmze9pS4a7qu9VdMkbIMe
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-