General
-
Target
55230c307898ecf9cde4abe61d12f60188fe68572440e28948dbf8e9b40ee905.exe
-
Size
2.2MB
-
Sample
250123-d8gc2azphs
-
MD5
5360ef1e31488f58a10481e97bc99189
-
SHA1
03a5a885f8cb0c06189768515763b764c2cc14ee
-
SHA256
55230c307898ecf9cde4abe61d12f60188fe68572440e28948dbf8e9b40ee905
-
SHA512
919f8d756466ec9ca46e855449f7183be1bdfc842e875147c8d9fa31c9a8e0ed72f9b1f1ff5faf1a618eba581dfdc2e1341501f73167bf475281bd52c93ef53a
-
SSDEEP
49152:5/dYw5NiJQgm+pUepZG2rIPHRTA449qILWhgn:dqEQJQgJmep/OxTPwqILWhc
Static task
static1
Behavioral task
behavioral1
Sample
55230c307898ecf9cde4abe61d12f60188fe68572440e28948dbf8e9b40ee905.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
javaupdate.100chickens.biz:6988
-
activex_autorun
false
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
XubCoRQh
-
offline_keylogger
true
-
password
123
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
55230c307898ecf9cde4abe61d12f60188fe68572440e28948dbf8e9b40ee905.exe
-
Size
2.2MB
-
MD5
5360ef1e31488f58a10481e97bc99189
-
SHA1
03a5a885f8cb0c06189768515763b764c2cc14ee
-
SHA256
55230c307898ecf9cde4abe61d12f60188fe68572440e28948dbf8e9b40ee905
-
SHA512
919f8d756466ec9ca46e855449f7183be1bdfc842e875147c8d9fa31c9a8e0ed72f9b1f1ff5faf1a618eba581dfdc2e1341501f73167bf475281bd52c93ef53a
-
SSDEEP
49152:5/dYw5NiJQgm+pUepZG2rIPHRTA449qILWhgn:dqEQJQgJmep/OxTPwqILWhc
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-