General

  • Target

    520-71-0x0000000000400000-0x0000000000450000-memory.dmp

  • Size

    320KB

  • MD5

    5ee5d235f8aa765e18b17757e8d0dd2e

  • SHA1

    398847191ddf3d37c7938c83132dc8a53f0d257b

  • SHA256

    84f482d8f6baaba63c60195dee8c4ee864bd5a5bba1ac1dedc64d10754e7708f

  • SHA512

    aba26aeab92c952d6edaf9e808ae9509bbaa9c49e397ead1202f82168900d71e5bb94dfc2f836af8d528680ed2593b86c589078e507ecb5df4a3356b3f410d6b

  • SSDEEP

    6144:ebhnot4+sbOAtbkfHLDiT6OzR8Q0l+/NyqRKbhoXqqD8X:elnot4+UwLDiT6OzR8llAgq

Score
10/10

Malware Config

Extracted

Family

netwire

C2

149.102.132.253:3399

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 520-71-0x0000000000400000-0x0000000000450000-memory.dmp
    .exe windows x86


    Headers

    Sections