General
-
Target
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895
-
Size
163KB
-
Sample
240410-la9kxsac99
-
MD5
a956cbab8fd7eaaf0c7dc8c7fd314a12
-
SHA1
1b32a0b0b7926a6bf52fb50bc2e5baa96622eaf5
-
SHA256
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895
-
SHA512
5b17b9445e6216148af24d8c9ba2355c694928ffe19b04974019d77338295ebb705276ed6f64aa4b3ae35c10a1df2e2089a942670378c3ebf04cfba5038c189d
-
SSDEEP
3072:30RI5MfZhlIjVQDAmnLf4mYhGT7dLYGMG7Nn/Ig03wzDLhz+1ZSG:335u+jDmLhLvq7G7N/Ig03wFzwZD
Static task
static1
Behavioral task
behavioral1
Sample
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
R4_GE_20.11.16
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Targets
-
-
Target
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895
-
Size
163KB
-
MD5
a956cbab8fd7eaaf0c7dc8c7fd314a12
-
SHA1
1b32a0b0b7926a6bf52fb50bc2e5baa96622eaf5
-
SHA256
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895
-
SHA512
5b17b9445e6216148af24d8c9ba2355c694928ffe19b04974019d77338295ebb705276ed6f64aa4b3ae35c10a1df2e2089a942670378c3ebf04cfba5038c189d
-
SSDEEP
3072:30RI5MfZhlIjVQDAmnLf4mYhGT7dLYGMG7Nn/Ig03wzDLhz+1ZSG:335u+jDmLhLvq7G7N/Ig03wFzwZD
-
NetWire RAT payload
-