General
-
Target
TcpClient.exe
-
Size
160KB
-
Sample
240809-hnaf7sxfjn
-
MD5
2df0cc45516057896f2aa7cbb090ba48
-
SHA1
89d0dd4af7d86333db104470ce22bd25b0c1f8d1
-
SHA256
3eb685dfb2506c3ec019ea69b788b771676d6a8d1eedf9ba08db8175966784fc
-
SHA512
458b6e2a724bd191383ff37078bb9b8df181da7c2801decafd5c7cdf7c52df6cc93b665f275b24e9bb7fdaa56cb0cd93df9c7227ee3d2865e84072a650abd43e
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLv2NYMjMqqDvFf:jOTcK+NrRioGHlz8rz0i/2NzQqqDvFf
Behavioral task
behavioral1
Sample
TcpClient.exe
Resource
win7-20240704-en
Malware Config
Extracted
netwire
hazbot.duckdns.org:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
fYGiNfhu
-
offline_keylogger
true
-
password
Hazza2021!
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
TcpClient.exe
-
Size
160KB
-
MD5
2df0cc45516057896f2aa7cbb090ba48
-
SHA1
89d0dd4af7d86333db104470ce22bd25b0c1f8d1
-
SHA256
3eb685dfb2506c3ec019ea69b788b771676d6a8d1eedf9ba08db8175966784fc
-
SHA512
458b6e2a724bd191383ff37078bb9b8df181da7c2801decafd5c7cdf7c52df6cc93b665f275b24e9bb7fdaa56cb0cd93df9c7227ee3d2865e84072a650abd43e
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLv2NYMjMqqDvFf:jOTcK+NrRioGHlz8rz0i/2NzQqqDvFf
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-