Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 17:58
Behavioral task
behavioral1
Sample
81cadf613f108486862c5f79d0e5e3a320ca433eb595f6686f7cb7478367c669.exe
Resource
win7-20241023-en
General
-
Target
81cadf613f108486862c5f79d0e5e3a320ca433eb595f6686f7cb7478367c669.exe
-
Size
160KB
-
MD5
b94adc74beea6a8879fa488901a56fe3
-
SHA1
a10510ab01f536b872e401baf331f660bae95e60
-
SHA256
81cadf613f108486862c5f79d0e5e3a320ca433eb595f6686f7cb7478367c669
-
SHA512
937d8849bc549afdc20c020c0dc773bb2627476ac21e27df4377ef4c582fa52ff2b32da4fd96029b505dad315a2aae853b67c03266b54f354dc341b9ff733c9d
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvvYMjMqqDvFfm:jOTcK+NrRioGHlz8rz0i/vzQqqDvFfm
Malware Config
Extracted
netwire
217.160.243.54:8080
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-ueY6u8
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2260-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81cadf613f108486862c5f79d0e5e3a320ca433eb595f6686f7cb7478367c669.exe