General
-
Target
73a730cc05e127b85ff61ee79abe22e97c3bd8e607e410e8537896fd414bc748
-
Size
990KB
-
Sample
240403-mgnsgacb2t
-
MD5
fbb147938c449be95316ff77906d3ecc
-
SHA1
06c46e8176c2ed1731a4a9644a15ee3404c21ce6
-
SHA256
73a730cc05e127b85ff61ee79abe22e97c3bd8e607e410e8537896fd414bc748
-
SHA512
aae86b03cc809772ac97d6992df21b19f9c33de082f478e682a97a23acd078573ea95b1eef90c19575b43f7985e077236d6f651690c82c0995d035303fe74e35
-
SSDEEP
24576:rfd8z4byilBdlfYB9GfxVAk+r8sYi/bhA:rf8IN19zfxWHA
Behavioral task
behavioral1
Sample
73a730cc05e127b85ff61ee79abe22e97c3bd8e607e410e8537896fd414bc748.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
43.226.229.43:2030
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Bo Tango
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Extracted
nanocore
1.2.2.0
79.134.225.12:1414
c6a98da5-e0f9-45b5-be57-98059178c440
-
activate_away_mode
true
-
backup_connection_host
79.134.225.12
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-04-20T13:14:05.944029236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1414
-
default_group
Directdeposit
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
c6a98da5-e0f9-45b5-be57-98059178c440
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
79.134.225.12
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
73a730cc05e127b85ff61ee79abe22e97c3bd8e607e410e8537896fd414bc748
-
Size
990KB
-
MD5
fbb147938c449be95316ff77906d3ecc
-
SHA1
06c46e8176c2ed1731a4a9644a15ee3404c21ce6
-
SHA256
73a730cc05e127b85ff61ee79abe22e97c3bd8e607e410e8537896fd414bc748
-
SHA512
aae86b03cc809772ac97d6992df21b19f9c33de082f478e682a97a23acd078573ea95b1eef90c19575b43f7985e077236d6f651690c82c0995d035303fe74e35
-
SSDEEP
24576:rfd8z4byilBdlfYB9GfxVAk+r8sYi/bhA:rf8IN19zfxWHA
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-