General

  • Target

    684-66-0x0000000000400000-0x0000000000497000-memory.dmp

  • Size

    604KB

  • MD5

    48a8e915649e0e97eca1f184dc6ebce2

  • SHA1

    a9c8abf6f564185e8e00b332e41d6479979c4b2b

  • SHA256

    bf2f3c3bfd2ba7f2f2797c9ed2df083f22396c38c59d6e417d65eaaa749e4a55

  • SHA512

    2952b3dffb2c87e3c322c5f326a30db6a27dab7e6f82b5678ffd7ecfeb8c41e2d4e46bf103c637c276781ea95e2a5bd35bbdf7519259d3d82dd9e1ccee2a25ef

  • SSDEEP

    12288:pO9WX2YItz2n+ga4VKCn2mvlY7y6MoYg0JTCa6+zhtJl2RLdr/:2WmYIg64VKl2Cy6u1tJlkLdr/

Score
10/10

Malware Config

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 684-66-0x0000000000400000-0x0000000000497000-memory.dmp
    .exe windows x86


    Headers

    Sections