General
-
Target
d15142a0a1c59537442b00f66882e45fd824cedeae2e4be53f1d2b7a00246d4c.zip
-
Size
214KB
-
Sample
250327-k5dajaztgw
-
MD5
db10bfe1419c2a4e6545bf1594f0bfc7
-
SHA1
072cd3663f231208f2bbb806d6cc5a5642dc2361
-
SHA256
d15142a0a1c59537442b00f66882e45fd824cedeae2e4be53f1d2b7a00246d4c
-
SHA512
d0d274739d653b40adc650d514c56adc19bd1b280d883e58e409303819512141f738a136cb5ce3893303367fcc1069056472a7bd3d8ce3fc579397a8f290cee3
-
SSDEEP
6144:Tz/8NEQVSFohTl8UwuRTDVfbFurILtxGN5NFW:Tz/80ojwe1cq+Nc
Static task
static1
Behavioral task
behavioral1
Sample
5a8d72946b1e08785bba3e067a64cdf3735b46834d4edf4d87d1916bd416a777.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a8d72946b1e08785bba3e067a64cdf3735b46834d4edf4d87d1916bd416a777.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
netwire
deesesejh45.hopto.org:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
oPXDHtoU
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
5a8d72946b1e08785bba3e067a64cdf3735b46834d4edf4d87d1916bd416a777.exe
-
Size
865KB
-
MD5
427e8565cb7c4bbff0ff3c07205f517a
-
SHA1
833a20dd03e1e5aed3d4284fde3d6a8208a97c88
-
SHA256
5a8d72946b1e08785bba3e067a64cdf3735b46834d4edf4d87d1916bd416a777
-
SHA512
59240e826ed5c265cc06f89b4826fc0de56e71ae46e19657b88976e89290c01a7320448e5aa82124fcaa88c534d99cee941cc986f57954da6dffc75faadebfeb
-
SSDEEP
12288:tWEauBVmKa8mdBBh4bgSZuG2U6uKEmaN0:UEaXB3WuIhN
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-