Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 14:25
Behavioral task
behavioral1
Sample
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
Resource
win7-20240221-en
General
-
Target
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
-
Size
84KB
-
MD5
a37c6527cabbbaf1e4aa9674b0476069
-
SHA1
32ce4f91b5ab0da2e1d290164636b2a0dfb46523
-
SHA256
f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e
-
SHA512
cdbe9010ef3cf60e065dea9684b650cdfb8164c59f50c7c01dae0824abeb161e18f270b29ec3c1d678106d1a5c3ac9d1f08f7f17b337d749679a09aeec903379
-
SSDEEP
1536:Jr/zIEc9uQ1q1vD9qrPP+r4MrdN/F+Xs6ibNqiRGWkxuATdWTza:Jr/zIEyQIrPP+r4MrdN/086ibgqGWkzR
Malware Config
Extracted
netwire
23.95.88.13:3360
-
activex_autorun
true
-
activex_key
{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-yaq2Oq
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
C:\Documents and Settings\Administrator\Application Data\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
doctor
-
registry_autorun
true
-
startup_name
system
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1152-0-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1152-1-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1152-2-0x0000000000400000-0x000000000041E000-memory.dmp netwire