General
-
Target
17d7053ad90824b93395300c73cf530c84353494920dd08e7a74b892b3f95000
-
Size
61KB
-
Sample
240417-p72hcshg4x
-
MD5
2b682850c2846118f82f8faae0bd3559
-
SHA1
8ab1992da60f4f025e4a816cf026ba075ebb6446
-
SHA256
17d7053ad90824b93395300c73cf530c84353494920dd08e7a74b892b3f95000
-
SHA512
2c8db19fb3b5ca8c729bf6e973c65c348846e9da58bb0adff1306917b327737beacbfade934f63525062aa0d12e65eea0f2f91cd0f7744066321d889801e10b2
-
SSDEEP
1536:Z88QTyoL5QulJfuhlhF41pLJ8Ovh9cC220mf5El6Bg5VnuH0emsi:Z81QuloPS5J5hShmBCXTuksi
Behavioral task
behavioral1
Sample
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
netwire
fucktoto.duckdns.org:3369
-
activex_autorun
true
-
activex_key
{4KUJJ476-38ES-RCMH-QGW0-22030L368G76}
-
copy_executable
true
-
delete_original
false
-
host_id
blower
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
gbam1234
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
-
Size
148KB
-
MD5
21f0006a914bac1bcca71c4167e65585
-
SHA1
d33e3d8053a8068a1de57a6cfa54bde59c6761d7
-
SHA256
20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323
-
SHA512
f84be9a43a136374b88d39ffaa263fa0bb2ef50c639ff2b649aec64f6ba9e4cc64860c99d3565c93662a17209df62200ef5b1b9309554ea643e18b31543f428c
-
SSDEEP
3072:ROzIy5XGViztldWl88Yed2DQuIAQvQ+d0aY1DLARX:Ro2ViztvWlvd2UuIAQvQ+yFVLAR
Score10/10-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-