General
-
Target
545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0
-
Size
183KB
-
Sample
240410-m39basdc97
-
MD5
ead29687b7c4e76c59269e76a85341b7
-
SHA1
e4358328f8547d837e42fe5f9a516cba1b00c2ee
-
SHA256
545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0
-
SHA512
ba57dbb371e40f792f9e69d37bb54a74858890de72e4a5e01ccfb1f83053cb15e71de5fa25c8df748e299247ab34a3aed97acbc6153c01de7f5f348e5f043b5c
-
SSDEEP
3072:2PDMqqDLy/QmY2hDO1woouAq1cBGpH+H97k0n3i/Us3mPrONNKTdZdvj:ZqqDLuxv8VzA6cO23GUsWUNSn
Static task
static1
Behavioral task
behavioral1
Sample
545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
claraoliveira.serveblog.net:4100
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
24.01.17
-
lock_executable
false
-
offline_keylogger
false
-
password
Dr#JgN43K@i6@92E401g
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0
-
Size
183KB
-
MD5
ead29687b7c4e76c59269e76a85341b7
-
SHA1
e4358328f8547d837e42fe5f9a516cba1b00c2ee
-
SHA256
545031fa5e8492908a4e9b61fdd6516e1ff4de7d7cbcf8d4a8347dfd8de466b0
-
SHA512
ba57dbb371e40f792f9e69d37bb54a74858890de72e4a5e01ccfb1f83053cb15e71de5fa25c8df748e299247ab34a3aed97acbc6153c01de7f5f348e5f043b5c
-
SSDEEP
3072:2PDMqqDLy/QmY2hDO1woouAq1cBGpH+H97k0n3i/Us3mPrONNKTdZdvj:ZqqDLuxv8VzA6cO23GUsWUNSn
-
NetWire RAT payload
-
Drops startup file
-