General
-
Target
924169297865bdc9b8f72b2a1dcf1bd50d03189d15f869bba91835d92bf42c6e
-
Size
1.3MB
-
Sample
250306-hv2h9s11cs
-
MD5
2f51ca6cf13a67f4308829b0e3b0dd0a
-
SHA1
427002da14744223c78ef2be5ea14dd5f60dbf28
-
SHA256
924169297865bdc9b8f72b2a1dcf1bd50d03189d15f869bba91835d92bf42c6e
-
SHA512
b08591f62d1d9f4bec21b79812ff43f99a81933850f0c6b3ae4a0f5545ceaa51b94345add6d32b14bc5c13daeb112dd13875143c07a9666ea3b3a9b06b3620e5
-
SSDEEP
24576:dAHnh+eWsN3skA4RV1Hom2KXMmHacrDc8WChe5i:8h+ZkldoPK8YacUCyi
Static task
static1
Behavioral task
behavioral1
Sample
924169297865bdc9b8f72b2a1dcf1bd50d03189d15f869bba91835d92bf42c6e.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
jinomoney.publicvm.com:7890
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
uupPNKrk
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
924169297865bdc9b8f72b2a1dcf1bd50d03189d15f869bba91835d92bf42c6e
-
Size
1.3MB
-
MD5
2f51ca6cf13a67f4308829b0e3b0dd0a
-
SHA1
427002da14744223c78ef2be5ea14dd5f60dbf28
-
SHA256
924169297865bdc9b8f72b2a1dcf1bd50d03189d15f869bba91835d92bf42c6e
-
SHA512
b08591f62d1d9f4bec21b79812ff43f99a81933850f0c6b3ae4a0f5545ceaa51b94345add6d32b14bc5c13daeb112dd13875143c07a9666ea3b3a9b06b3620e5
-
SSDEEP
24576:dAHnh+eWsN3skA4RV1Hom2KXMmHacrDc8WChe5i:8h+ZkldoPK8YacUCyi
-
NetWire RAT payload
-
Netwire family
-
Drops startup file
-
Suspicious use of SetThreadContext
-