General
-
Target
73a93786fa6ce81d1d23389abfda250ea816514764d2fcc28e4837ad85fc1ba3N
-
Size
178KB
-
Sample
241106-vwjq3awqgl
-
MD5
ba7842cb913de2aa30b8699a1f8f32d0
-
SHA1
a2b2625d1bd2b0fd00ea5671856295bd9085bc10
-
SHA256
73a93786fa6ce81d1d23389abfda250ea816514764d2fcc28e4837ad85fc1ba3
-
SHA512
2860348364518430b49cffd42f98ecd74c9926940b942c635c1f6fa83440a344c678c2c72d185c41acb53e2bbfe5c4e8878f40de4f22ae3a31b3e8846344c50d
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwV:I7VzxYnWI6agAalr4UrPp8WStPQu28I
Static task
static1
Behavioral task
behavioral1
Sample
73a93786fa6ce81d1d23389abfda250ea816514764d2fcc28e4837ad85fc1ba3N.exe
Resource
win7-20241023-en
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
73a93786fa6ce81d1d23389abfda250ea816514764d2fcc28e4837ad85fc1ba3N
-
Size
178KB
-
MD5
ba7842cb913de2aa30b8699a1f8f32d0
-
SHA1
a2b2625d1bd2b0fd00ea5671856295bd9085bc10
-
SHA256
73a93786fa6ce81d1d23389abfda250ea816514764d2fcc28e4837ad85fc1ba3
-
SHA512
2860348364518430b49cffd42f98ecd74c9926940b942c635c1f6fa83440a344c678c2c72d185c41acb53e2bbfe5c4e8878f40de4f22ae3a31b3e8846344c50d
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwV:I7VzxYnWI6agAalr4UrPp8WStPQu28I
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1