General
-
Target
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
-
Size
84KB
-
Sample
240527-rrg5wsfe2w
-
MD5
a37c6527cabbbaf1e4aa9674b0476069
-
SHA1
32ce4f91b5ab0da2e1d290164636b2a0dfb46523
-
SHA256
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e
-
SHA512
cdbe9010ef3cf60e065dea9684b650cdfb8164c59f50c7c01dae0824abeb161e18f270b29ec3c1d678106d1a5c3ac9d1f08f7f17b337d749679a09aeec903379
-
SSDEEP
1536:Jr/zIEc9uQ1q1vD9qrPP+r4MrdN/F+Xs6ibNqiRGWkxuATdWTza:Jr/zIEyQIrPP+r4MrdN/086ibgqGWkzR
Behavioral task
behavioral1
Sample
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
23.95.88.13:3360
-
activex_autorun
true
-
activex_key
{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-yaq2Oq
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
C:\Documents and Settings\Administrator\Application Data\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
doctor
-
registry_autorun
true
-
startup_name
system
-
use_mutex
false
Targets
-
-
Target
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
-
Size
84KB
-
MD5
a37c6527cabbbaf1e4aa9674b0476069
-
SHA1
32ce4f91b5ab0da2e1d290164636b2a0dfb46523
-
SHA256
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e
-
SHA512
cdbe9010ef3cf60e065dea9684b650cdfb8164c59f50c7c01dae0824abeb161e18f270b29ec3c1d678106d1a5c3ac9d1f08f7f17b337d749679a09aeec903379
-
SSDEEP
1536:Jr/zIEc9uQ1q1vD9qrPP+r4MrdN/F+Xs6ibNqiRGWkxuATdWTza:Jr/zIEyQIrPP+r4MrdN/086ibgqGWkzR
-
NetWire RAT payload
-