General
-
Target
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe
-
Size
178KB
-
Sample
241201-224rra1pfm
-
MD5
e569a1b41541d2e7a1bd0ac55d1826a0
-
SHA1
f7657cc8993c94ffc86174f0343f530040058d8b
-
SHA256
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebb
-
SHA512
0cf26d15a30fcb320da15f12ee925bdd04f53a3ae3ce3db19fb458c32a7e42417787d28763fe83dbc4e025fa8afd1fbef9e81bd64699d50b1a1e29c29123d218
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPw0:I7VzxYnWI6agAalr4UrPp8WStPQu28J
Static task
static1
Behavioral task
behavioral1
Sample
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe
-
Size
178KB
-
MD5
e569a1b41541d2e7a1bd0ac55d1826a0
-
SHA1
f7657cc8993c94ffc86174f0343f530040058d8b
-
SHA256
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebb
-
SHA512
0cf26d15a30fcb320da15f12ee925bdd04f53a3ae3ce3db19fb458c32a7e42417787d28763fe83dbc4e025fa8afd1fbef9e81bd64699d50b1a1e29c29123d218
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPw0:I7VzxYnWI6agAalr4UrPp8WStPQu28J
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1