General
-
Target
4d39a4925a2a54e97b78eb5bceb7810bb9758ac538824262f819c28a83765accN.exe
-
Size
84KB
-
Sample
241129-ze2yjazlan
-
MD5
252a84885022a9a27fe448c66dda6990
-
SHA1
55d3b1bf097f2ee037ca9c70db80f56713bb32da
-
SHA256
4d39a4925a2a54e97b78eb5bceb7810bb9758ac538824262f819c28a83765acc
-
SHA512
27b4cec160d30b027c041e53f2a35f0ebea7e74262e158b21c4c52fdb92ed61e8f5a0e3068e56eab038158bcce6c9501e2b2876e1407e6fc77c15d329b48a6e4
-
SSDEEP
1536:Jr/zIEc9uQ1q1vD9qrPP+r4MrdN/F+Xs6ibNqiRGWkxuA1qWTD:Jr/zIEyQIrPP+r4MrdN/086ibgqGWktH
Behavioral task
behavioral1
Sample
4d39a4925a2a54e97b78eb5bceb7810bb9758ac538824262f819c28a83765accN.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
C:\Users\Administrator\AppData\Roaming\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
4d39a4925a2a54e97b78eb5bceb7810bb9758ac538824262f819c28a83765accN.exe
-
Size
84KB
-
MD5
252a84885022a9a27fe448c66dda6990
-
SHA1
55d3b1bf097f2ee037ca9c70db80f56713bb32da
-
SHA256
4d39a4925a2a54e97b78eb5bceb7810bb9758ac538824262f819c28a83765acc
-
SHA512
27b4cec160d30b027c041e53f2a35f0ebea7e74262e158b21c4c52fdb92ed61e8f5a0e3068e56eab038158bcce6c9501e2b2876e1407e6fc77c15d329b48a6e4
-
SSDEEP
1536:Jr/zIEc9uQ1q1vD9qrPP+r4MrdN/F+Xs6ibNqiRGWkxuA1qWTD:Jr/zIEyQIrPP+r4MrdN/086ibgqGWktH
-
NetWire RAT payload
-
Netwire family
-