General

  • Target

    838dcb9b19c330b4ecba06dfb5d5aa465a9cb1f188c48d2b0bdba1825f9f5a03

  • Size

    51KB

  • MD5

    23681f6652a894f1ae518879a4d7c915

  • SHA1

    e7a0c59496bfa6f51cc80c127d88cee4427edeb3

  • SHA256

    838dcb9b19c330b4ecba06dfb5d5aa465a9cb1f188c48d2b0bdba1825f9f5a03

  • SHA512

    4da96e3b1f895cb97e7753fb701b60cec469d2980e324fc74ba55196007a3f7af7e2a0051cc1a6148df72d6360302a2aa2191925fa92089bd225b6f24375cc85

  • SSDEEP

    1536:ubDxZQcXHFjC2I6ec/LDk7Z7QtmKDc9e/P+MNJ6Qn1Vg:IDxZ7XIaLENKDcw/BNJ6QnM

Score
10/10

Malware Config

Extracted

Family

netwire

C2

majika.gotdns.ch:1120

nik.pointto.us:1120

nikouh.pointto.us:1120

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    naza

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • mutex

    CVkJEjPx

  • offline_keylogger

    true

  • password

    vodka

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 838dcb9b19c330b4ecba06dfb5d5aa465a9cb1f188c48d2b0bdba1825f9f5a03
    .zip

    Password: infected

  • 3647bace25f94430a534aba8aba08a731571ab2ab22f95ac209096e2c32ef81c.exe
    .exe windows:4 windows x86 arch:x86

    4e6ba17721530f6e9a509b1380c99995


    Headers

    Imports

    Sections