General
-
Target
e8ef02beaf986390fcb537d1cb3d6a51.zip
-
Size
1.9MB
-
Sample
240831-jaf79sscjd
-
MD5
72c5147a2fc0c38416e9e60f64e1aeb2
-
SHA1
e4b92177e9b04ab96607794dc836aebbd2189095
-
SHA256
13612ddc4999d0d8750de055a5c3343d669ad9ebe51dee337ea7fd91958df3b2
-
SHA512
bf36c8ca719de871bb59f6516402f3be6d759f6919459d14ef38fbc1f27d4ef9340d3f569f13b9126c3cebe92fedf636ae57c1549fd0154c44f7d68042efc079
-
SSDEEP
49152:ufmUf2DTRig5PJRH+0sY3z1OJ4/5LkjfvGOsDMfj088:MmUf27rprxAiAbs
Static task
static1
Behavioral task
behavioral1
Sample
370c78ecd539292a20e84dd4f58aaf5194a3b0db5ea857adfd46b50d6333426a.exe
Resource
win7-20240705-en
Malware Config
Extracted
netwire
173.209.48.226:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
370c78ecd539292a20e84dd4f58aaf5194a3b0db5ea857adfd46b50d6333426a
-
Size
4.4MB
-
MD5
e8ef02beaf986390fcb537d1cb3d6a51
-
SHA1
fb47e64ccd6566032d7c85a89a8570270d8621a5
-
SHA256
370c78ecd539292a20e84dd4f58aaf5194a3b0db5ea857adfd46b50d6333426a
-
SHA512
8a488b90a5337acdf93a104e8aa963c9ca1d9d122606359f5629441b6ef2d745b35c9b6da2d3c85946bffdb0a8cf316c7f6db4bf967b67a064154143170bfc33
-
SSDEEP
98304:74AqGkgAo0Gkuv0VrN2OVDv4j24lilj1qT:74vlPqsrNAi9UT
-
NetWire RAT payload
-
Drops startup file
-