General
-
Target
9b3e0ffa4be1f599e85b8bdc98f0ff9a3f5fc592c8ad4cc266cdc8c4e86d02bc
-
Size
508KB
-
Sample
240410-p5lzwsbe4t
-
MD5
af79639a14200ea25410b902fe0d5ee7
-
SHA1
7534c4d126d62c1f5964a89cc1af8f0eb565bc38
-
SHA256
9b3e0ffa4be1f599e85b8bdc98f0ff9a3f5fc592c8ad4cc266cdc8c4e86d02bc
-
SHA512
5bc876bd0189cfabecb2b09e7e2807b5d6c17a49a7896589a8caef92a05e06fe725e1cac7240b1186c0eec4bcfd0433d35966509447084b8d6d261a18e54bad0
-
SSDEEP
3072:2bTMqqDLy/+6qthXLYvIZXC5QYCejNU35d1wrk/wvmxk97SbBL9NYIsFD34tqZtS:xqqDLumhRNyNOD1k1mxaw2LDW6OuAf
Static task
static1
Behavioral task
behavioral1
Sample
9b3e0ffa4be1f599e85b8bdc98f0ff9a3f5fc592c8ad4cc266cdc8c4e86d02bc.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
R4_GE_14.10.16
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Targets
-
-
Target
9b3e0ffa4be1f599e85b8bdc98f0ff9a3f5fc592c8ad4cc266cdc8c4e86d02bc
-
Size
508KB
-
MD5
af79639a14200ea25410b902fe0d5ee7
-
SHA1
7534c4d126d62c1f5964a89cc1af8f0eb565bc38
-
SHA256
9b3e0ffa4be1f599e85b8bdc98f0ff9a3f5fc592c8ad4cc266cdc8c4e86d02bc
-
SHA512
5bc876bd0189cfabecb2b09e7e2807b5d6c17a49a7896589a8caef92a05e06fe725e1cac7240b1186c0eec4bcfd0433d35966509447084b8d6d261a18e54bad0
-
SSDEEP
3072:2bTMqqDLy/+6qthXLYvIZXC5QYCejNU35d1wrk/wvmxk97SbBL9NYIsFD34tqZtS:xqqDLumhRNyNOD1k1mxaw2LDW6OuAf
-
NetWire RAT payload
-