General
-
Target
dbd37b8c044a27ec8008c6489231075f
-
Size
359KB
-
Sample
240321-rjy4faeh3z
-
MD5
dbd37b8c044a27ec8008c6489231075f
-
SHA1
cc5b97876fe9b09e2e0618a9f1a7c4dc1d78d129
-
SHA256
5226a12dc7f7b5e28732ad8b5ad6fa9a35eadfbeec122d798cd53c5ef73fe86a
-
SHA512
2ac7bc5b879ee7088e91120ef9b5b22d58b7be28f59960317524948e78417021cd13ba4701367e701e453cde84e64b29072643b6a183a203c506070a71d6d166
-
SSDEEP
6144:ZlfjLIs254Cz4FatkOAOqQxM3QLylFzk8x2dQ325Y/XDzQsFv:Z9jLIs25BrxM3+yHY84dQmGzz7F
Static task
static1
Behavioral task
behavioral1
Sample
dbd37b8c044a27ec8008c6489231075f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbd37b8c044a27ec8008c6489231075f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
66.154.103.106:13377
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
myphone
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
dbd37b8c044a27ec8008c6489231075f
-
Size
359KB
-
MD5
dbd37b8c044a27ec8008c6489231075f
-
SHA1
cc5b97876fe9b09e2e0618a9f1a7c4dc1d78d129
-
SHA256
5226a12dc7f7b5e28732ad8b5ad6fa9a35eadfbeec122d798cd53c5ef73fe86a
-
SHA512
2ac7bc5b879ee7088e91120ef9b5b22d58b7be28f59960317524948e78417021cd13ba4701367e701e453cde84e64b29072643b6a183a203c506070a71d6d166
-
SSDEEP
6144:ZlfjLIs254Cz4FatkOAOqQxM3QLylFzk8x2dQ325Y/XDzQsFv:Z9jLIs25BrxM3+yHY84dQmGzz7F
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-