General
-
Target
39b4a8c85fe1d3079cc61ed9043c0fba88df6308a8757a3a92b617fa5bbbbf63
-
Size
123KB
-
Sample
240831-pm75eatblk
-
MD5
0a18313e07b9e963082293c666145aa9
-
SHA1
bb44da37109b50f77e900c420c16f8885da7c490
-
SHA256
39b4a8c85fe1d3079cc61ed9043c0fba88df6308a8757a3a92b617fa5bbbbf63
-
SHA512
f8a788413e8bf02a32fe60d6123a0ce8df60662d4826f96dcb096c2bbfb18088d199edd56a7f773828a8e28865b102872e7ef83971b08f3e1eef9274d7f1d76e
-
SSDEEP
3072:juCe7mLNF5RF6myGgJ4DavXR5Ih5F35VW/TVvx1oyxOL:/eCNF7MmyGo4Do65FJY/TVO
Static task
static1
Behavioral task
behavioral1
Sample
cf262af15cf1bb93dd7a33befc777c07c35d4a7ff5f4154843dd978b1ee1f050.exe
Resource
win7-20240708-en
Malware Config
Extracted
netwire
185.84.181.95:8977
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
LAGOS NAWA
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
cf262af15cf1bb93dd7a33befc777c07c35d4a7ff5f4154843dd978b1ee1f050
-
Size
172KB
-
MD5
d2e05b36afb06317a92932daad1d97c3
-
SHA1
5c209baf6b2e47754d51c5e204f7c75bad164e72
-
SHA256
cf262af15cf1bb93dd7a33befc777c07c35d4a7ff5f4154843dd978b1ee1f050
-
SHA512
096be34312354d5972a698b130ca4c065adbcb1af443f6fa0d5abe89679f81134eb7ec8b8306791266ee89c7cdb6d60e3c7252a2574ba2d07193242954cdfc28
-
SSDEEP
3072:d6RrEikYA0QdTh532O8QXJlx3er+jL7ScA96TElZIajM/naFhNlUw4WOXZT:dd0Ih532Kd3zjL7S1kEl7jyaFJm
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-