General
-
Target
f5da759038e0c82740e3a588288a27cc6189e9f634a7950bca73554f59bc51adN.exe
-
Size
638KB
-
Sample
241127-jt8rma1pek
-
MD5
4abb761d7e191cb014ebceb18733f370
-
SHA1
3c627257f7de83f32b21afa194f4cf294c3f3cb8
-
SHA256
f5da759038e0c82740e3a588288a27cc6189e9f634a7950bca73554f59bc51ad
-
SHA512
54732778c642efc962710b5bdba309b706dd2dac7e6fcbdf1f3698c12ebff6ae7afdb19b3d2cf94e6ba7eb7be4a16b9a4ffffab879958b4c5dd4ff6da718bc60
-
SSDEEP
6144:IbjjGk3F9ELCvfCdgv232mrXLK1UTVMkayZEkcR9eKS+rI:kGkVSLCvu3nXLKoVM0EkcR9BI
Static task
static1
Behavioral task
behavioral1
Sample
f5da759038e0c82740e3a588288a27cc6189e9f634a7950bca73554f59bc51adN.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
nightwolf.dyndns-ip.com:2020
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-MgqmO0
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
f5da759038e0c82740e3a588288a27cc6189e9f634a7950bca73554f59bc51adN.exe
-
Size
638KB
-
MD5
4abb761d7e191cb014ebceb18733f370
-
SHA1
3c627257f7de83f32b21afa194f4cf294c3f3cb8
-
SHA256
f5da759038e0c82740e3a588288a27cc6189e9f634a7950bca73554f59bc51ad
-
SHA512
54732778c642efc962710b5bdba309b706dd2dac7e6fcbdf1f3698c12ebff6ae7afdb19b3d2cf94e6ba7eb7be4a16b9a4ffffab879958b4c5dd4ff6da718bc60
-
SSDEEP
6144:IbjjGk3F9ELCvfCdgv232mrXLK1UTVMkayZEkcR9eKS+rI:kGkVSLCvu3nXLKoVM0EkcR9BI
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-