General

  • Target

    17d7053ad90824b93395300c73cf530c84353494920dd08e7a74b892b3f95000

  • Size

    61KB

  • MD5

    2b682850c2846118f82f8faae0bd3559

  • SHA1

    8ab1992da60f4f025e4a816cf026ba075ebb6446

  • SHA256

    17d7053ad90824b93395300c73cf530c84353494920dd08e7a74b892b3f95000

  • SHA512

    2c8db19fb3b5ca8c729bf6e973c65c348846e9da58bb0adff1306917b327737beacbfade934f63525062aa0d12e65eea0f2f91cd0f7744066321d889801e10b2

  • SSDEEP

    1536:Z88QTyoL5QulJfuhlhF41pLJ8Ovh9cC220mf5El6Bg5VnuH0emsi:Z81QuloPS5J5hShmBCXTuksi

Score
10/10

Malware Config

Extracted

Family

netwire

C2

fucktoto.duckdns.org:3369

Attributes
  • activex_autorun

    true

  • activex_key

    {4KUJJ476-38ES-RCMH-QGW0-22030L368G76}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    blower

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    gbam1234

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 17d7053ad90824b93395300c73cf530c84353494920dd08e7a74b892b3f95000
    .zip

    Password: infected

  • 20a7088411ad98c4dd710ec1913d464e374b28d4873c26a0dcc2910e486b9323.exe
    .exe windows:4 windows x86 arch:x86

    844b1e992f862088369589b7cf91ba21


    Headers

    Imports

    Sections