Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 01:18
Behavioral task
behavioral1
Sample
e55d6c6652145fe9b7ae5cc8b9806b259f3ed2e134fb825f3bed7fa8bc25fd6c.exe
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
e55d6c6652145fe9b7ae5cc8b9806b259f3ed2e134fb825f3bed7fa8bc25fd6c.exe
-
Size
84KB
-
MD5
9096907f595b85c38d86501e1e6392a1
-
SHA1
7a0566f02a87eb7fd4ca988fce5e6d4bc1be54ac
-
SHA256
e55d6c6652145fe9b7ae5cc8b9806b259f3ed2e134fb825f3bed7fa8bc25fd6c
-
SHA512
66d686f1f8d6cf5339d02497b67c9cb2cef64eeecc66b7cfcdd81d0a542c14ffe4fbf1e586aaddb3a74ea1f3c24313bebc9725a7de4c9eb5b1acfc50185ac1aa
-
SSDEEP
1536:7Lp3YvQCGQ10ismSklVI8VjCX1Isv3fA9qeRgLHsbgI+BSr1Ra:7Lp3Yvhn9VI8VjCX1I43fAwegLMTrO
Malware Config
Extracted
Family
netwire
C2
86t7b9br9.ddns.net:8980
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-OuEmii
-
lock_executable
false
-
offline_keylogger
false
-
password
4678553478654HJKGHKJGHKJG4543
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers