General
-
Target
bf7751dab2b489bd1f3034b609779b4d
-
Size
998KB
-
Sample
240311-bn16lagg8s
-
MD5
bf7751dab2b489bd1f3034b609779b4d
-
SHA1
ee0f5a5fd0a29b06f7a6716ed261a3876541366f
-
SHA256
ff2b159f4ca9611604db05a3ecc47311d64a08eeb157e023498b64543ba386e0
-
SHA512
fa8efa576c55ea2f0b4b2a04907f8439d6a19dec7a3bc77e555417318bd12a29c12e0016b34b2fdb8d5b9c2293dc6c13823edab2ca3a2adef3081b1803cdf882
-
SSDEEP
12288:ZcWqp30xRbKF8iFGCmjvXo3DK3PfLVw/dyZwcgslNMw0qhx9v6o4qGGWEhPTg8E9:nqpSQN2v4GHog/gslNMwvjSb3
Static task
static1
Behavioral task
behavioral1
Sample
bf7751dab2b489bd1f3034b609779b4d.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
6790netwire.geekgalaxy.com:6790
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
bf7751dab2b489bd1f3034b609779b4d
-
Size
998KB
-
MD5
bf7751dab2b489bd1f3034b609779b4d
-
SHA1
ee0f5a5fd0a29b06f7a6716ed261a3876541366f
-
SHA256
ff2b159f4ca9611604db05a3ecc47311d64a08eeb157e023498b64543ba386e0
-
SHA512
fa8efa576c55ea2f0b4b2a04907f8439d6a19dec7a3bc77e555417318bd12a29c12e0016b34b2fdb8d5b9c2293dc6c13823edab2ca3a2adef3081b1803cdf882
-
SSDEEP
12288:ZcWqp30xRbKF8iFGCmjvXo3DK3PfLVw/dyZwcgslNMw0qhx9v6o4qGGWEhPTg8E9:nqpSQN2v4GHog/gslNMwvjSb3
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-