General
-
Target
81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67
-
Size
440KB
-
Sample
240820-wfsjpsvhkh
-
MD5
53fd837cce4527d93c5d4cf91f822155
-
SHA1
59a5ecd6bc055784f05dbd7aa099a125bb9a0263
-
SHA256
81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67
-
SHA512
877c9954e9de9f7afef2498999e067e8e41dfbeaff1bf878f1d5654153ef6afe99c3d0db5b75b254faaa5ad2517f53aacd2f9b84dbf85ad90e305cb13176fb0e
-
SSDEEP
6144:YFb5HOviqia9rwJYJkh8qEnwoHo7YDh/GdTUpdTxk6zsVN3JRjN3Jw:g5HOvsSr8YJkPEw5ZT4d11cN3JRpJw
Static task
static1
Behavioral task
behavioral1
Sample
81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
vad.invvipbooknowreverse.vladimir.ru:8079
vlad.securefoodlinkdownload.kz:8078
vlad.racordvasdems.su:8077
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
NossSs-%Rand%
-
keylogger_dir
%AppData%\Dobe\
-
lock_executable
false
-
offline_keylogger
true
-
password
19891989
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67
-
Size
440KB
-
MD5
53fd837cce4527d93c5d4cf91f822155
-
SHA1
59a5ecd6bc055784f05dbd7aa099a125bb9a0263
-
SHA256
81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67
-
SHA512
877c9954e9de9f7afef2498999e067e8e41dfbeaff1bf878f1d5654153ef6afe99c3d0db5b75b254faaa5ad2517f53aacd2f9b84dbf85ad90e305cb13176fb0e
-
SSDEEP
6144:YFb5HOviqia9rwJYJkh8qEnwoHo7YDh/GdTUpdTxk6zsVN3JRjN3Jw:g5HOvsSr8YJkPEw5ZT4d11cN3JRpJw
-
NetWire RAT payload
-
Drops file in System32 directory
-