General
-
Target
44725b5a138576b271585cd3bd634d46fa1008431ac7aa654305bb7b230f852c.exe
-
Size
172KB
-
Sample
241122-sjns5stjat
-
MD5
65a9e18be273d43f3b166c03ee14de0b
-
SHA1
b9e38a19b4fca188bdc40c166076ac31d58e6367
-
SHA256
44725b5a138576b271585cd3bd634d46fa1008431ac7aa654305bb7b230f852c
-
SHA512
c91215ae456a1ca393251aa697a23637684bb37e04f7d67212932bf9155944f97ed7330b2b41d6826be7310acc8b6a0cff2d38247edcc036089acc6b4803cd60
-
SSDEEP
3072:z6RrEikYA0QdTh532O8QXJlx3er+jL7ScA96TElZIajM/naFhNlUw4WOXZxK:zd0Ih532Kd3zjL7S1kEl7jyaFJmY
Static task
static1
Behavioral task
behavioral1
Sample
44725b5a138576b271585cd3bd634d46fa1008431ac7aa654305bb7b230f852c.exe
Resource
win7-20241023-en
Malware Config
Extracted
netwire
185.84.181.95:8977
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
LAGOS NAWA
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
44725b5a138576b271585cd3bd634d46fa1008431ac7aa654305bb7b230f852c.exe
-
Size
172KB
-
MD5
65a9e18be273d43f3b166c03ee14de0b
-
SHA1
b9e38a19b4fca188bdc40c166076ac31d58e6367
-
SHA256
44725b5a138576b271585cd3bd634d46fa1008431ac7aa654305bb7b230f852c
-
SHA512
c91215ae456a1ca393251aa697a23637684bb37e04f7d67212932bf9155944f97ed7330b2b41d6826be7310acc8b6a0cff2d38247edcc036089acc6b4803cd60
-
SSDEEP
3072:z6RrEikYA0QdTh532O8QXJlx3er+jL7ScA96TElZIajM/naFhNlUw4WOXZxK:zd0Ih532Kd3zjL7S1kEl7jyaFJmY
-
NetWire RAT payload
-
Netwire family
-
Drops startup file
-
Suspicious use of SetThreadContext
-