Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 14:12
Behavioral task
behavioral1
Sample
4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28.exe
-
Size
160KB
-
MD5
e477181e703bd428f9346ffe3198e16f
-
SHA1
ca92071f9c5290450fc13f3c11b3cbca20d7b75b
-
SHA256
4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28
-
SHA512
284e7cca5ed9d3635b15fdb9d7d415f9f77986feb4997cabcba71de26a3ef9748bfa636b9b2bb4f9bf51b0adddecf9f8913139a044bef19f55855a9576f924bc
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvG3YMjMqqDuFf:jOTcK+NrRioGHlz8rz0i/uzQqqDuFf
Malware Config
Extracted
Family
netwire
C2
43.226.229.43:2030
Attributes
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
ECHO
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
C:\Users\Administrator\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1704-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1704-1-0x0000000000400000-0x0000000000433000-memory.dmp netwire