General
-
Target
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
-
Size
160KB
-
Sample
240527-r28qlafh31
-
MD5
48e6ba377d90401cee819471fcea38b9
-
SHA1
0f6f6ef2b5691946703d37a6316452dda6d5eab5
-
SHA256
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8
-
SHA512
caf22b64bf47f6515d7f75dbfc8605ce85a3248188d61049f1cd54ce0b6cbb441fd1005333464f66a95d990e2f912d4b60e5418a4d7b14fd4f115e156cbf307f
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvGdYMjMqqDL0Ff:jOTcK+NrRioGHlz8rz0i/8zQqqDwFf
Behavioral task
behavioral1
Sample
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
Resource
win7-20240508-en
Malware Config
Extracted
netwire
netwire2021.duckdns.org:7929
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-yISsE2
-
keylogger_dir
C:\Users\Administrator\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
qFlJFfII
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
-
Size
160KB
-
MD5
48e6ba377d90401cee819471fcea38b9
-
SHA1
0f6f6ef2b5691946703d37a6316452dda6d5eab5
-
SHA256
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8
-
SHA512
caf22b64bf47f6515d7f75dbfc8605ce85a3248188d61049f1cd54ce0b6cbb441fd1005333464f66a95d990e2f912d4b60e5418a4d7b14fd4f115e156cbf307f
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvGdYMjMqqDL0Ff:jOTcK+NrRioGHlz8rz0i/8zQqqDwFf
-
NetWire RAT payload
-