General
-
Target
dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461
-
Size
382KB
-
Sample
240410-rtegsabb37
-
MD5
61c22386df656f32f45bc1928a1e5a94
-
SHA1
3f448c01907cf6dc39c3cdd4860accf5f222aff6
-
SHA256
dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461
-
SHA512
14e32e6b8e14b8c128515dda07d50c2b2da2a50ff60fff6b9a29d04000100b45e9fa79689ba2da36de7082257963005d33332ff30dbb121631eb405031de4c41
-
SSDEEP
6144:Bz+92mhAMJ/cPl3i8/hwJBXvJ+AiSWnmRR/Iq1ipEH3fa9t7SroeR43ddDWQt1S2:BK2mhAMJ/cPlJiXv4Aivmr/opq3S9g8H
Static task
static1
Behavioral task
behavioral1
Sample
dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
atlaswebportal.zapto.org:4000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
1.6_R1_26.12.15
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
Micr0s0ft4456877
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
atlaswebportal.zapto.org
Targets
-
-
Target
dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461
-
Size
382KB
-
MD5
61c22386df656f32f45bc1928a1e5a94
-
SHA1
3f448c01907cf6dc39c3cdd4860accf5f222aff6
-
SHA256
dbfa0bedf01e570f988beb7562f97356a9dc6cd97dc9908b99e99eb732f80461
-
SHA512
14e32e6b8e14b8c128515dda07d50c2b2da2a50ff60fff6b9a29d04000100b45e9fa79689ba2da36de7082257963005d33332ff30dbb121631eb405031de4c41
-
SSDEEP
6144:Bz+92mhAMJ/cPl3i8/hwJBXvJ+AiSWnmRR/Iq1ipEH3fa9t7SroeR43ddDWQt1S2:BK2mhAMJ/cPlJiXv4Aivmr/opq3S9g8H
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-