General
-
Target
534377e8adc7b7d642c9c9177fd4e4cdc1eab0feca142e059eb21bbbdee0e3f5
-
Size
168KB
-
Sample
240410-m3c8vsdc72
-
MD5
ac65e7d08e48c6d20e3f90f7d9f73d8b
-
SHA1
1dc7aa5ededab0009c6e693d2f713da4fd85cb17
-
SHA256
534377e8adc7b7d642c9c9177fd4e4cdc1eab0feca142e059eb21bbbdee0e3f5
-
SHA512
8ca3bda79d5427d2476e5ea2a20682c76c4dc34673f36b1499cc492d1bd2a31be24a45b9a15e15f28de92c1aa48256722814b2d6827de606f4e907595f16e372
-
SSDEEP
3072:2wUTTMqqDLy/0hSO4aMH8s/0K/dM7ry4VtmOo/KhtLL1YZYTb7Qw5:3qqDLu0hSjau/0K/UW47JrLxQ
Static task
static1
Behavioral task
behavioral1
Sample
534377e8adc7b7d642c9c9177fd4e4cdc1eab0feca142e059eb21bbbdee0e3f5.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
1.6_R1_18.06.16
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Targets
-
-
Target
534377e8adc7b7d642c9c9177fd4e4cdc1eab0feca142e059eb21bbbdee0e3f5
-
Size
168KB
-
MD5
ac65e7d08e48c6d20e3f90f7d9f73d8b
-
SHA1
1dc7aa5ededab0009c6e693d2f713da4fd85cb17
-
SHA256
534377e8adc7b7d642c9c9177fd4e4cdc1eab0feca142e059eb21bbbdee0e3f5
-
SHA512
8ca3bda79d5427d2476e5ea2a20682c76c4dc34673f36b1499cc492d1bd2a31be24a45b9a15e15f28de92c1aa48256722814b2d6827de606f4e907595f16e372
-
SSDEEP
3072:2wUTTMqqDLy/0hSO4aMH8s/0K/dM7ry4VtmOo/KhtLL1YZYTb7Qw5:3qqDLu0hSjau/0K/UW47JrLxQ
-
NetWire RAT payload
-