General
-
Target
89088633f3855626d861016cbfbde070N.exe
-
Size
1.0MB
-
Sample
240903-jplrassenf
-
MD5
89088633f3855626d861016cbfbde070
-
SHA1
9f7125cd883dcb02b09cc0b4600f94df394ea29a
-
SHA256
4bc227156273b500f6aa709f0c412fac5cc797aef3edbc8a1ed6c0e6b6a65444
-
SHA512
7db5fc691805f06b89312a34323e6ea581fcc94214236e673643708a5a5cb540a958e98abad00ef7c9ca288427b116bc1d4e78ce162bbbb51fa8bd401128b9d2
-
SSDEEP
24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaKHICN34Ls+5OMAs:xh+ZkldoPK8YaKHbZcFJ
Static task
static1
Behavioral task
behavioral1
Sample
89088633f3855626d861016cbfbde070N.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
billions.ddns.net:39780
makebillionaires.warzonedns.com:39360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
onelove
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
89088633f3855626d861016cbfbde070N.exe
-
Size
1.0MB
-
MD5
89088633f3855626d861016cbfbde070
-
SHA1
9f7125cd883dcb02b09cc0b4600f94df394ea29a
-
SHA256
4bc227156273b500f6aa709f0c412fac5cc797aef3edbc8a1ed6c0e6b6a65444
-
SHA512
7db5fc691805f06b89312a34323e6ea581fcc94214236e673643708a5a5cb540a958e98abad00ef7c9ca288427b116bc1d4e78ce162bbbb51fa8bd401128b9d2
-
SSDEEP
24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaKHICN34Ls+5OMAs:xh+ZkldoPK8YaKHbZcFJ
-
NetWire RAT payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-