General
-
Target
733e1c6851f36fdbb0e3bad19ee09980N.exe
-
Size
847KB
-
Sample
240716-fxdtwawfjj
-
MD5
733e1c6851f36fdbb0e3bad19ee09980
-
SHA1
8c885eca455287b319193a31abf32d398ec019d8
-
SHA256
d5386caad6ba9e808acca20d63fc451c27adfa7f81dd7b6cb1ac1e8ecf752603
-
SHA512
0b0fb22c38c4168965c42227b83473b52a51bfed3fa211046a8e76b2436af65fbefbc3402cc8eb7f94331fb664e8426d527977f92f54616fe98c5c61f89d5569
-
SSDEEP
12288:+GdQQdRcc8xl/hy/m6Io77RAKVtgVpA9TUsUzq9Yt5IlSOArWFazwb3C2kUz:+OQQGfCm6IQAE59TUEGylNArWgqC2ky
Static task
static1
Behavioral task
behavioral1
Sample
733e1c6851f36fdbb0e3bad19ee09980N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
733e1c6851f36fdbb0e3bad19ee09980N.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
netwire
94.242.59.7:56565
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
VPS
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Appleaddict45@
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
733e1c6851f36fdbb0e3bad19ee09980N.exe
-
Size
847KB
-
MD5
733e1c6851f36fdbb0e3bad19ee09980
-
SHA1
8c885eca455287b319193a31abf32d398ec019d8
-
SHA256
d5386caad6ba9e808acca20d63fc451c27adfa7f81dd7b6cb1ac1e8ecf752603
-
SHA512
0b0fb22c38c4168965c42227b83473b52a51bfed3fa211046a8e76b2436af65fbefbc3402cc8eb7f94331fb664e8426d527977f92f54616fe98c5c61f89d5569
-
SSDEEP
12288:+GdQQdRcc8xl/hy/m6Io77RAKVtgVpA9TUsUzq9Yt5IlSOArWFazwb3C2kUz:+OQQGfCm6IQAE59TUEGylNArWgqC2ky
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-