General

  • Target

    Key-Steal.zip

  • Size

    227KB

  • MD5

    291a0a1b75d4375fa54f62f25d7a136a

  • SHA1

    33079c44648402bbd770dfd158e9623b1dbbf145

  • SHA256

    093cb9134822c32a6eeb8b0f33ccf5d9e2371fcacffafa38d09cbdc6b364a31a

  • SHA512

    e949a75be481cf31a3f959479d838782548446a823b54ea90b36c82e362008b9bbcea31a8662d6949df19959f620044b9fd218321fff37b4f6aa8f0d1c2babd5

  • SSDEEP

    6144:17rXTrWeVB4PHWrf9F7ri9rGbAUH4PHa4D99Do9ow:ljr1VBcHWP2/UHcH/Rlo9z

Score
10/10

Malware Config

Extracted

Family

netwire

C2

86t7b9br9.ddns.net:8980

23.95.88.13:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-MAm4sa

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    4678553478654HJKGHKJGHKJG4543

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire family
  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • Key-Steal.zip
    .zip
  • 19be771df58a8532ef07a64a4029aa4333570a5e33e069ede44338b1357e3ab8.exe
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • 8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe
    .exe windows:4 windows x86 arch:x86

    eaf9915d2b5730c3717ea003bd93404a


    Headers

    Imports

    Sections

  • de04bfb0017396977c37fedb18d30e174080c71d1e9e7e0054577ca0d8b1e5ce.exe
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • e55d6c6652145fe9b7ae5cc8b9806b259f3ed2e134fb825f3bed7fa8bc25fd6c.exe
    .exe windows:4 windows x86 arch:x86

    eaf9915d2b5730c3717ea003bd93404a


    Headers

    Imports

    Sections

  • f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
    .exe windows:4 windows x86 arch:x86

    eaf9915d2b5730c3717ea003bd93404a


    Headers

    Imports

    Sections