General
-
Target
d1523e199fbefbec0bc01761b49f981d
-
Size
2.6MB
-
Sample
240317-tr97saac43
-
MD5
d1523e199fbefbec0bc01761b49f981d
-
SHA1
121b2ffa4dc7eca9880d8dca8d5d0fdb6211eb4c
-
SHA256
ba1f01fd0c66cd2d59dcbffa1d5b4387c4249921da221603cc4523e3a58dbbe5
-
SHA512
5cf3ccc467f870f6c6b599e5bf4532e744a841f26dab9fd350f8691348939f7bef4f82fb172bfb3eede59a73e433d8b3db4f407df7cdcfdda027228de06eb40a
-
SSDEEP
49152:Fw80cTsjkWaPgHzoah04We95N5P7OEiF/ivu2BoUxPLPgPkWDSrt:y8sjkY7S4bjOLqv1BoUx0/+r
Static task
static1
Behavioral task
behavioral1
Sample
d1523e199fbefbec0bc01761b49f981d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1523e199fbefbec0bc01761b49f981d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
haija.mine.nu:1338
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
aegispirate
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
OOxTmvdD
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
true
-
startup_name
chrome
-
use_mutex
true
Targets
-
-
Target
d1523e199fbefbec0bc01761b49f981d
-
Size
2.6MB
-
MD5
d1523e199fbefbec0bc01761b49f981d
-
SHA1
121b2ffa4dc7eca9880d8dca8d5d0fdb6211eb4c
-
SHA256
ba1f01fd0c66cd2d59dcbffa1d5b4387c4249921da221603cc4523e3a58dbbe5
-
SHA512
5cf3ccc467f870f6c6b599e5bf4532e744a841f26dab9fd350f8691348939f7bef4f82fb172bfb3eede59a73e433d8b3db4f407df7cdcfdda027228de06eb40a
-
SSDEEP
49152:Fw80cTsjkWaPgHzoah04We95N5P7OEiF/ivu2BoUxPLPgPkWDSrt:y8sjkY7S4bjOLqv1BoUx0/+r
Score10/10-
NetWire RAT payload
-
Core1 .NET packer
Detects packer/loader used by .NET malware.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-