General
-
Target
9c76298d787f4403f11198bf8e152ad240920f78d8d83d513593ee12413c1cb1
-
Size
167KB
-
Sample
240605-bcjgeaab52
-
MD5
c9ff819281194df505bc58436230d4f0
-
SHA1
37d9c57d344d27b433bbb978621c26582323f4d8
-
SHA256
9c76298d787f4403f11198bf8e152ad240920f78d8d83d513593ee12413c1cb1
-
SHA512
cdd05805355acac207823e26c09131f4c091bf278eebab1e65b7842e2434db4c23771e7a9b38547e5f54b7772f969baa65d8fc1f46b3d4787aba87377ec16f73
-
SSDEEP
3072:uj6P858kS7wI9J4bPTni2b4HuwIAhhJHyd61+KNweG/5m1NEQGMKJHFDRCy0B6OH:uj6P8OwI9J4bPTni2b4HuwIAhhJHyd6F
Static task
static1
Behavioral task
behavioral1
Sample
9c76298d787f4403f11198bf8e152ad240920f78d8d83d513593ee12413c1cb1.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9c76298d787f4403f11198bf8e152ad240920f78d8d83d513593ee12413c1cb1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
joseagre1.ddns.net:3360
-
activex_autorun
true
-
activex_key
{8BH55S7F-B16V-EH36-V02L-QMU8J57K44R4}
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
9c76298d787f4403f11198bf8e152ad240920f78d8d83d513593ee12413c1cb1
-
Size
167KB
-
MD5
c9ff819281194df505bc58436230d4f0
-
SHA1
37d9c57d344d27b433bbb978621c26582323f4d8
-
SHA256
9c76298d787f4403f11198bf8e152ad240920f78d8d83d513593ee12413c1cb1
-
SHA512
cdd05805355acac207823e26c09131f4c091bf278eebab1e65b7842e2434db4c23771e7a9b38547e5f54b7772f969baa65d8fc1f46b3d4787aba87377ec16f73
-
SSDEEP
3072:uj6P858kS7wI9J4bPTni2b4HuwIAhhJHyd61+KNweG/5m1NEQGMKJHFDRCy0B6OH:uj6P8OwI9J4bPTni2b4HuwIAhhJHyd6F
Score10/10-
NetWire RAT payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-