General
-
Target
95e613ca65dd3caeea84dbd4565560c51c415aa5a0efcd1b3bbb3d3fef1d0729
-
Size
180KB
-
Sample
240410-p18m4agb69
-
MD5
bf164f4ffe8f571666e6ffdabba9d08f
-
SHA1
cb3c9aa04640bac42deef24f5ec8b567aa8f1492
-
SHA256
95e613ca65dd3caeea84dbd4565560c51c415aa5a0efcd1b3bbb3d3fef1d0729
-
SHA512
89cba3d9c07512a0c17a29a752af00922993ac9920cb76342fc863b40259ba2c66faa017919f774d9d24e405c4569c71bc165eb758238a1a8568e44174e06ad5
-
SSDEEP
3072:epEjcGc91dtmnlPJRb+qi4lwEOGreJHc+8F15hdZ06BcOZ9UICV9+oohkSYY7J:YEjpO3TBHTE5bu6BhZ9Up+ooGOl
Static task
static1
Behavioral task
behavioral1
Sample
95e613ca65dd3caeea84dbd4565560c51c415aa5a0efcd1b3bbb3d3fef1d0729.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95e613ca65dd3caeea84dbd4565560c51c415aa5a0efcd1b3bbb3d3fef1d0729.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
R4_GE_20.11.16
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Targets
-
-
Target
95e613ca65dd3caeea84dbd4565560c51c415aa5a0efcd1b3bbb3d3fef1d0729
-
Size
180KB
-
MD5
bf164f4ffe8f571666e6ffdabba9d08f
-
SHA1
cb3c9aa04640bac42deef24f5ec8b567aa8f1492
-
SHA256
95e613ca65dd3caeea84dbd4565560c51c415aa5a0efcd1b3bbb3d3fef1d0729
-
SHA512
89cba3d9c07512a0c17a29a752af00922993ac9920cb76342fc863b40259ba2c66faa017919f774d9d24e405c4569c71bc165eb758238a1a8568e44174e06ad5
-
SSDEEP
3072:epEjcGc91dtmnlPJRb+qi4lwEOGreJHc+8F15hdZ06BcOZ9UICV9+oohkSYY7J:YEjpO3TBHTE5bu6BhZ9Up+ooGOl
-
NetWire RAT payload
-