General
-
Target
b16e12601037d9179ebce918489f77f9f782fa59d56f2e65fb517f4619129ad8
-
Size
172KB
-
Sample
240410-qs6dfahd73
-
MD5
ac04dfc7ccd9cc317b73f5860da94e7a
-
SHA1
879a35cc71cd75e3c5ec4b2d8308bc620e2cc0bc
-
SHA256
b16e12601037d9179ebce918489f77f9f782fa59d56f2e65fb517f4619129ad8
-
SHA512
6f79e6571ef83706ba7a492545850d7cfbf48fe7cc6d914ee14561c19b81399ffc785c3fea6c430cd1718304dd218cb3d5cfd85610af633ea8eec80bb58c65e0
-
SSDEEP
3072:2msTTMqqDLy/XUW7TEihWr0u84lUBPGrFQoBZo+lChCjMpTxFM:NqqDLuEW7Tlh+T84lqe1B1DU
Static task
static1
Behavioral task
behavioral1
Sample
b16e12601037d9179ebce918489f77f9f782fa59d56f2e65fb517f4619129ad8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b16e12601037d9179ebce918489f77f9f782fa59d56f2e65fb517f4619129ad8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
1.6_R1_27.05.16
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
b16e12601037d9179ebce918489f77f9f782fa59d56f2e65fb517f4619129ad8
-
Size
172KB
-
MD5
ac04dfc7ccd9cc317b73f5860da94e7a
-
SHA1
879a35cc71cd75e3c5ec4b2d8308bc620e2cc0bc
-
SHA256
b16e12601037d9179ebce918489f77f9f782fa59d56f2e65fb517f4619129ad8
-
SHA512
6f79e6571ef83706ba7a492545850d7cfbf48fe7cc6d914ee14561c19b81399ffc785c3fea6c430cd1718304dd218cb3d5cfd85610af633ea8eec80bb58c65e0
-
SSDEEP
3072:2msTTMqqDLy/XUW7TEihWr0u84lUBPGrFQoBZo+lChCjMpTxFM:NqqDLuEW7Tlh+T84lqe1B1DU
-
NetWire RAT payload
-