General
-
Target
c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a.zip
-
Size
131KB
-
Sample
240402-qjjhbabd37
-
MD5
18d03a1de5b3b813db80d1ad6590214a
-
SHA1
c9be7891b7c786486f998e8df3d3b22939019b7c
-
SHA256
dcea5a58f947015d5871a8e54c69be1c4bd01d6f0188ae3a75e538d0dff6d7eb
-
SHA512
57bff6008279d096d0949e1ce074f3f33222a8a7184d3788d429ad6877e54f643728a5c91761c0739fb4f956751097e7e2e62e882f1ac67c9454f920d1baa64b
-
SSDEEP
3072:hr1EFXrSAcGmR1EE/seekAOTYXZypHNZbEA+DqzHeUxlWc1K:p1EFXrSAy1zsKLG494AFKmWl
Static task
static1
Behavioral task
behavioral1
Sample
c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
winx.xcapdatap.capetown:7390
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Jagz_$$$
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
P@55w0rd!
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a.exe
-
Size
208KB
-
MD5
3b25677fa8107108e47bf97e9df675a6
-
SHA1
fb4c79542cf166a2f7b099b65c43db58b6a01e68
-
SHA256
c14f7a70a3083113154ae0242fd0e14b4c54056cfdb419ec46f3e0471bf0827a
-
SHA512
71010fcba0fc1973b642332b25eda77eeda517c819e203b683fe005c3f5c332a86a7bd5fa5150e34f300577ec8404eac7e66ef3c91542ae90bb4bfd857edc280
-
SSDEEP
3072:2H4l3KCxknsqA36giLi9YiE8qoX4Ot6QN05XRu+/glGMs4u8jQHVVy0b:2HCLqs12Li9YhqthN0RGFs+QH
Score10/10-
NetWire RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-