General
-
Target
db73833937c45296d4893505b43deb93986422b052d5f25080296cc2cf889424
-
Size
112KB
-
Sample
240410-rtahtsbb28
-
MD5
319444e7bd7a20caef38dfcf22948f3c
-
SHA1
b36911d184d3dbe4cf123ea129c550508ce7741d
-
SHA256
db73833937c45296d4893505b43deb93986422b052d5f25080296cc2cf889424
-
SHA512
1ff46554ae94b4e134665667010a6b68e8f89ccd9ac4f672a2c31b596434b06cdbe164da6a08acb1954f4d968d39ec2d6dcd777cd0514071c802c458ab1fbe21
-
SSDEEP
3072:6bvuDlK3L7wHfxy8SOk41y2KC9V6rboG0/RhJAPout4:cGDswHfxL4C97ZhJKoS4
Behavioral task
behavioral1
Sample
db73833937c45296d4893505b43deb93986422b052d5f25080296cc2cf889424.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
1.6_R1_20.12.15
-
install_path
%AppData%\ihotkeysm\vuzehotkeym.exe
-
keylogger_dir
%AppData%\fcc\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
true
-
startup_name
IETHotkeysm
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Targets
-
-
Target
db73833937c45296d4893505b43deb93986422b052d5f25080296cc2cf889424
-
Size
112KB
-
MD5
319444e7bd7a20caef38dfcf22948f3c
-
SHA1
b36911d184d3dbe4cf123ea129c550508ce7741d
-
SHA256
db73833937c45296d4893505b43deb93986422b052d5f25080296cc2cf889424
-
SHA512
1ff46554ae94b4e134665667010a6b68e8f89ccd9ac4f672a2c31b596434b06cdbe164da6a08acb1954f4d968d39ec2d6dcd777cd0514071c802c458ab1fbe21
-
SSDEEP
3072:6bvuDlK3L7wHfxy8SOk41y2KC9V6rboG0/RhJAPout4:cGDswHfxL4C97ZhJKoS4
-
NetWire RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-