General
-
Target
a854daae51fa94c185b26687c0f8f2358be39034d1b41bd67c1f2069e1659d86.zip
-
Size
458KB
-
Sample
250327-ahrjjavvht
-
MD5
c8246d7589ddddecdaecd6e4c01e8620
-
SHA1
b34eb5f1dd12d390db2547bdfe137e3e1161c71c
-
SHA256
a854daae51fa94c185b26687c0f8f2358be39034d1b41bd67c1f2069e1659d86
-
SHA512
9c911ad5c5ae741a8c3ddad5532f9022d02f25b636d8718f793f9466e29635358ffd28af061362ef49f1b1d2c36945d53bcb378f51bb715358bb43d21430a34e
-
SSDEEP
12288:2/vewwjUvKLu7NUGmOOVgcXwY//yE5T4E:2/mHUqV3XwcyEOE
Behavioral task
behavioral1
Sample
BBVA_CONTINENTAL.exe
Resource
win7-20241010-en
Malware Config
Extracted
netwire
43.226.229.43:2030
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Omega
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
BBVA_CONTINENTAL.exe
-
Size
475KB
-
MD5
c621bbe4050616a3e086eff0003c0739
-
SHA1
5527d8ab10c04aea8d149d9056199895b7d79d0e
-
SHA256
de7a446a8d4bd4c53ba8ac5b909252692e79b27cd9e7abb6396e62e22274b3b4
-
SHA512
1fc11eaab31db24b848d11097ff9abd1cd3603f34db875dc45328f21ac1a12f6e32da271600035639e8b41e4c6ba6d21bb0fbeeec3d5d3cc70c4a3c6c33bec00
-
SSDEEP
12288:talGzgvpec7Cmv1BdWw/2xv3GdfzF4yFv:6TAc+PwexedfjFv
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-