General
-
Target
20b11d44b4ee8320455e755b40f263aa548750ed7c02e1a6f03337f61e25b2a8
-
Size
833KB
-
Sample
250212-jfydqsslhs
-
MD5
16652e2d769991aa0a99adc429c1e5a2
-
SHA1
2006c46a828c6f699fbe4012980bb957dc2b076d
-
SHA256
20b11d44b4ee8320455e755b40f263aa548750ed7c02e1a6f03337f61e25b2a8
-
SHA512
3f7c918cc60f6f8a251ce0bd749e8a09dacfe0fffceb8656d0f1fc1a0b1a94843efe44f94ae3bc31ff7b3a4e0a02fa8c70c1c0c858c2ac2aa37233d51ec0a6ab
-
SSDEEP
24576:lm9vvaLdQpiGhd4fqerCDFRFSMUeYw8S9K33:lm9vvIQptperOFDfUe98/n
Static task
static1
Behavioral task
behavioral1
Sample
Payment Notification.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
154.16.93.177:3365
154.16.93.177:3368
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
stanley012345
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
Payment Notification.exe
-
Size
985KB
-
MD5
e74f81db191d9908262caa4969915996
-
SHA1
5f437e6b4af5bda95c61fb04192743f97d4f2b30
-
SHA256
14796fa693fd9ad320db492f9e7697f89a3c999be8edf43756189eee0cabb558
-
SHA512
709c9e89e86e7d2f8f77ee120993f62360f9f950bbe8604d8fa6d0ebffc727d86a248949e7109997066881d2fed549efc039d990419cb02c9e85e35e7f30226b
-
SSDEEP
24576:bNA3R5drX9jd944+qehoDvRSSMgsi5seYn8S9KRP:G59J9tehAvcflze4851
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1