Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe
Resource
win10v2004-20240226-en
General
-
Target
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe
-
Size
163KB
-
MD5
a956cbab8fd7eaaf0c7dc8c7fd314a12
-
SHA1
1b32a0b0b7926a6bf52fb50bc2e5baa96622eaf5
-
SHA256
02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895
-
SHA512
5b17b9445e6216148af24d8c9ba2355c694928ffe19b04974019d77338295ebb705276ed6f64aa4b3ae35c10a1df2e2089a942670378c3ebf04cfba5038c189d
-
SSDEEP
3072:30RI5MfZhlIjVQDAmnLf4mYhGT7dLYGMG7Nn/Ig03wzDLhz+1ZSG:335u+jDmLhLvq7G7N/Ig03wFzwZD
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
R4_GE_20.11.16
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1540-3-0x0000000000400000-0x0000000000448000-memory.dmp netwire behavioral1/memory/1540-7-0x0000000000400000-0x0000000000448000-memory.dmp netwire -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1540 02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe 1540 02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe 1540 02f01ecd157c2675d018d6081d5dbd2f4db94f17775f3fa1a0bf0dd0472ca895.exe