General
-
Target
21daa55b09213ecdee0108b027b3aa53.bin
-
Size
561KB
-
Sample
240509-bmz7xaac4s
-
MD5
21daa55b09213ecdee0108b027b3aa53
-
SHA1
c6eb2d539531355ce9ce22fe029f0934065dbb7d
-
SHA256
e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02
-
SHA512
c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95
-
SSDEEP
6144:C4xWH5KrIJU1TJqy4P5z4xWH5KrIJUXa+GAsebVLS37btJWB5DURZov5:OKbl0PnKHVseiBEBNt
Static task
static1
Behavioral task
behavioral1
Sample
21daa55b09213ecdee0108b027b3aa53.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
21daa55b09213ecdee0108b027b3aa53.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
185.163.100.31:3364
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Frank321
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
21daa55b09213ecdee0108b027b3aa53.bin
-
Size
561KB
-
MD5
21daa55b09213ecdee0108b027b3aa53
-
SHA1
c6eb2d539531355ce9ce22fe029f0934065dbb7d
-
SHA256
e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02
-
SHA512
c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95
-
SSDEEP
6144:C4xWH5KrIJU1TJqy4P5z4xWH5KrIJUXa+GAsebVLS37btJWB5DURZov5:OKbl0PnKHVseiBEBNt
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-