General

  • Target

    3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.zip

  • Size

    51KB

  • MD5

    74988b94f0fea5561307d3fdd5895bef

  • SHA1

    d90758c460987c871a793be417bffcaacf748903

  • SHA256

    036c7efdd1a4dbb64234227521f510498a938b67f3658363767ffb368cc692d9

  • SHA512

    614e247312a110722fe64c9cb2fbd7b0bac6a88d663865ba8207409d757c4284974553b586167dca95ef84793598198c9097294ebcff276750f39b6d47e197c1

  • SSDEEP

    1536:z/nAru3PTtfTNnOmLF2/LGcLa0Z6CNqkg:TnAaL7OdTvL0

Score
10/10

Malware Config

Extracted

Family

netwire

C2

majika.gotdns.ch:1120

nik.pointto.us:1120

nikouh.pointto.us:1120

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    naza

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    CVkJEjPx

  • offline_keylogger

    true

  • password

    vodka

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.zip
    .zip

    Password: infected

  • 3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    4e6ba17721530f6e9a509b1380c99995


    Headers

    Imports

    Sections