General
-
Target
RNSM00401.7z
-
Size
15.3MB
-
Sample
241030-1tbwbstjhj
-
MD5
82ba3c8e635d5e3e743049d29eb92a72
-
SHA1
ad4f048b3e0cfd4284362f3d940ecc9008b68fad
-
SHA256
f128b85f26a5fae2bfa3cba5ea746d561a87d53f7713aee985fc68c8b4905895
-
SHA512
ad6c87b7e8a9baa6b9c934186424eee6e366aed016651a344cdcc66e36ff28c017cb0ecca1f9bc5d1174cace2eb6a665205a081ad9c90feffd7f758658a8bfe3
-
SSDEEP
393216:P9DZi2W047ho8UZzx+F8edI0MK+bG8nYwDFXlDGn:PPi2WZNo8W+F8eJMKb8B1DM
Static task
static1
Malware Config
Extracted
netwire
uploadp3p.publicvm.com:3361
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
NeW-%Rand%
-
install_path
%AppData%\Install\sisHost.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
kHnMFtjY
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Extracted
C:\Program Files\Common Files\microsoft shared\ClickToRun\Read_Me.txt
http://alcx6zctcmhmn3kx.onion/?FHULIFMO
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
RNSM00401.7z
-
Size
15.3MB
-
MD5
82ba3c8e635d5e3e743049d29eb92a72
-
SHA1
ad4f048b3e0cfd4284362f3d940ecc9008b68fad
-
SHA256
f128b85f26a5fae2bfa3cba5ea746d561a87d53f7713aee985fc68c8b4905895
-
SHA512
ad6c87b7e8a9baa6b9c934186424eee6e366aed016651a344cdcc66e36ff28c017cb0ecca1f9bc5d1174cace2eb6a665205a081ad9c90feffd7f758658a8bfe3
-
SSDEEP
393216:P9DZi2W047ho8UZzx+F8edI0MK+bG8nYwDFXlDGn:PPi2WZNo8W+F8eJMKb8B1DM
-
NetWire RAT payload
-
Netwire family
-
Executes dropped EXE
-