General
-
Target
796-70-0x0000000000400000-0x0000000000433000-memory.dmp
-
Size
204KB
-
Sample
220704-m7d1ysggdm
-
MD5
a1a80d3d999b4cc0ba79de6894946a22
-
SHA1
40691cb04d78c53dd243c93e77f44abddacfbac3
-
SHA256
7123fb828db8630a124d0db3f5f7a057c8df5c36491a495bd2f59d5925d783da
-
SHA512
b814329c736ceca43e347233bd1fe916ac98c1a0faf39e1a5d054c5b87ff6600023f0a4f52ee6ffa7ec89825340bea91554d229af69adefe0855a1e4447eeb1f
Behavioral task
behavioral1
Sample
796-70-0x0000000000400000-0x0000000000433000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
796-70-0x0000000000400000-0x0000000000433000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
185.140.53.61:3363
185.140.53.61:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
796-70-0x0000000000400000-0x0000000000433000-memory.dmp
-
Size
204KB
-
MD5
a1a80d3d999b4cc0ba79de6894946a22
-
SHA1
40691cb04d78c53dd243c93e77f44abddacfbac3
-
SHA256
7123fb828db8630a124d0db3f5f7a057c8df5c36491a495bd2f59d5925d783da
-
SHA512
b814329c736ceca43e347233bd1fe916ac98c1a0faf39e1a5d054c5b87ff6600023f0a4f52ee6ffa7ec89825340bea91554d229af69adefe0855a1e4447eeb1f
Score3/10 -