General
-
Target
7649b0d5eac5d15692826bcaff2ac11264c87e3aea26ff89e19e280ed3a5806d.exe
-
Size
638KB
-
Sample
241125-jxpsxssqgp
-
MD5
727d339d4485e05c1cc8764c854eddbf
-
SHA1
c230be06684e4f27dfaa066c0d3f631232770bb6
-
SHA256
7649b0d5eac5d15692826bcaff2ac11264c87e3aea26ff89e19e280ed3a5806d
-
SHA512
f1bd31e1963bc36468f0fde5c50de555e6dba5361585017e9720e249cc8133fdd72a7274928cb7ba8564d0d42d508a008ae0ee220ea9773af98f7f7b4d9c3925
-
SSDEEP
6144:IbjjGk3F9ELCvfCdgv232mrXLK1UTVMkayZEkcR9eKS+rId:kGkVSLCvu3nXLKoVM0EkcR9BId
Static task
static1
Behavioral task
behavioral1
Sample
7649b0d5eac5d15692826bcaff2ac11264c87e3aea26ff89e19e280ed3a5806d.exe
Resource
win7-20240729-en
Malware Config
Extracted
netwire
nightwolf.dyndns-ip.com:2020
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-Wai8Ky
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
7649b0d5eac5d15692826bcaff2ac11264c87e3aea26ff89e19e280ed3a5806d.exe
-
Size
638KB
-
MD5
727d339d4485e05c1cc8764c854eddbf
-
SHA1
c230be06684e4f27dfaa066c0d3f631232770bb6
-
SHA256
7649b0d5eac5d15692826bcaff2ac11264c87e3aea26ff89e19e280ed3a5806d
-
SHA512
f1bd31e1963bc36468f0fde5c50de555e6dba5361585017e9720e249cc8133fdd72a7274928cb7ba8564d0d42d508a008ae0ee220ea9773af98f7f7b4d9c3925
-
SSDEEP
6144:IbjjGk3F9ELCvfCdgv232mrXLK1UTVMkayZEkcR9eKS+rId:kGkVSLCvu3nXLKoVM0EkcR9BId
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-