General
-
Target
2020-71-0x0000000000400000-0x0000000000450000-memory.dmp
-
Size
320KB
-
Sample
220705-lbkyysfgan
-
MD5
ccb664ca1bc6fe2400b4c9cb5402ccbc
-
SHA1
0447ef5f1f1aef5a23284ea1f495693b933b4f66
-
SHA256
e7fe5d314a7b17eeaf58f6d47c20ba704d47cfccfa076038f7fd441f6fb64094
-
SHA512
c15c60a779298c192058551c2fc8671538da3245c74d3a39b91c9a05239a2f01cae2eb3d767e37967752f4bbecbb6906f2c3f9f01f1e5fb514b09cb54dc95fac
Behavioral task
behavioral1
Sample
2020-71-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2020-71-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
xman2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
2020-71-0x0000000000400000-0x0000000000450000-memory.dmp
-
Size
320KB
-
MD5
ccb664ca1bc6fe2400b4c9cb5402ccbc
-
SHA1
0447ef5f1f1aef5a23284ea1f495693b933b4f66
-
SHA256
e7fe5d314a7b17eeaf58f6d47c20ba704d47cfccfa076038f7fd441f6fb64094
-
SHA512
c15c60a779298c192058551c2fc8671538da3245c74d3a39b91c9a05239a2f01cae2eb3d767e37967752f4bbecbb6906f2c3f9f01f1e5fb514b09cb54dc95fac
Score1/10 -