General
-
Target
2024-03-21_e7ec9d8d4f7a4d95a0930cc0edd0ef67_magniber
-
Size
428KB
-
Sample
240321-pwybkabf89
-
MD5
e7ec9d8d4f7a4d95a0930cc0edd0ef67
-
SHA1
5a550f2d93e482e03b8eadc8f76f1e58522ba92a
-
SHA256
01fedac252586b32d1bf4e97772e5c2647f0991bf223e629fae99d500a4b21ac
-
SHA512
0da73d7214ae3b06c35148871d571f6fea1585339b2c8b7fe3253464867f10cdc6d26f4eb6ae18ef5f14dbfd3ef43ac6ce34b5a017ca5432f3dc074bfb9c099c
-
SSDEEP
6144:RIDoAWSXrMWBfGnYi7OtSrMNKFNnUeCwkTo7KK1837w/lNWIJz1O:4jRrppkbNUeH7KC1dYIJZO
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-21_e7ec9d8d4f7a4d95a0930cc0edd0ef67_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-21_e7ec9d8d4f7a4d95a0930cc0edd0ef67_magniber.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
almaduhector.no-ip.biz:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
2024-03-21_e7ec9d8d4f7a4d95a0930cc0edd0ef67_magniber
-
Size
428KB
-
MD5
e7ec9d8d4f7a4d95a0930cc0edd0ef67
-
SHA1
5a550f2d93e482e03b8eadc8f76f1e58522ba92a
-
SHA256
01fedac252586b32d1bf4e97772e5c2647f0991bf223e629fae99d500a4b21ac
-
SHA512
0da73d7214ae3b06c35148871d571f6fea1585339b2c8b7fe3253464867f10cdc6d26f4eb6ae18ef5f14dbfd3ef43ac6ce34b5a017ca5432f3dc074bfb9c099c
-
SSDEEP
6144:RIDoAWSXrMWBfGnYi7OtSrMNKFNnUeCwkTo7KK1837w/lNWIJz1O:4jRrppkbNUeH7KC1dYIJZO
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-