General
-
Target
540236b76967933bb87e0ef367305f2e56dac966370d3989203e2faa70bf32d9N
-
Size
178KB
-
Sample
241015-l4xs8aybmb
-
MD5
fdd19703be4eef41ca88975b29887460
-
SHA1
ee92d74428a9b60aab301ecbe84247a4fa3987f6
-
SHA256
540236b76967933bb87e0ef367305f2e56dac966370d3989203e2faa70bf32d9
-
SHA512
f91c4a2d09622ff0b26c7c8e1bb0e3316b407978a6c4f00fe9f828239d8232fee6010f67aa386b67f394528bcb71043d9da04e7659b0bce8886973051c15c92e
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwe:I7VzxYnWI6agAalr4UrPp8WStPQu28/
Static task
static1
Behavioral task
behavioral1
Sample
540236b76967933bb87e0ef367305f2e56dac966370d3989203e2faa70bf32d9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
540236b76967933bb87e0ef367305f2e56dac966370d3989203e2faa70bf32d9N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
540236b76967933bb87e0ef367305f2e56dac966370d3989203e2faa70bf32d9N
-
Size
178KB
-
MD5
fdd19703be4eef41ca88975b29887460
-
SHA1
ee92d74428a9b60aab301ecbe84247a4fa3987f6
-
SHA256
540236b76967933bb87e0ef367305f2e56dac966370d3989203e2faa70bf32d9
-
SHA512
f91c4a2d09622ff0b26c7c8e1bb0e3316b407978a6c4f00fe9f828239d8232fee6010f67aa386b67f394528bcb71043d9da04e7659b0bce8886973051c15c92e
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwe:I7VzxYnWI6agAalr4UrPp8WStPQu28/
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1