General
-
Target
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.zip
-
Size
61KB
-
Sample
240402-q6rgfacd35
-
MD5
cdc853d89ab579fca68fb859bf84821c
-
SHA1
34e2aa2d05994d17995c6b15f0c419c1d00365ac
-
SHA256
77331846fda5886293f066c1d172404233e926b16ea85daaaa5c1110abc87cc0
-
SHA512
cfbf849874f59014194888d61a473a9e34ca1a3546bc4edbf5d14de3f6080658ebc8c4eccfd2ceb8ce2bc64b6136f4e8c310190b63207c0c88eb8856217922c5
-
SSDEEP
1536:ruqHkhAGyzkknW2YS5JrzOZz7PK0OjgcruAsqYv:9HXAMjKAuAhc
Behavioral task
behavioral1
Sample
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
fucktoto.duckdns.org:3369
-
activex_autorun
true
-
activex_key
{4KUJJ476-38ES-RCMH-QGW0-22030L368G76}
-
copy_executable
true
-
delete_original
false
-
host_id
blower
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
gbam1234
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
-
Size
148KB
-
MD5
21f0006a914bac1bcca71c4167e65585
-
SHA1
d33e3d8053a8068a1de57a6cfa54bde59c6761d7
-
SHA256
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323
-
SHA512
f84be9a43a136374b88d39ffaa263fa0bb2ef50c639ff2b649aec64f6ba9e4cc64860c99d3565c93662a17209df62200ef5b1b9309554ea643e18b31543f428c
-
SSDEEP
3072:ROzIy5XGViztldWl88Yed2DQuIAQvQ+d0aY1DLARX:Ro2ViztvWlvd2UuIAQvQ+yFVLAR
Score10/10-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-