General

  • Target

    1276-66-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • MD5

    6f7b58884d12130294d46eaa85ec1494

  • SHA1

    18286700ab5c9cfb3ce6457b4d4b9a1114e617ec

  • SHA256

    d5a03a43c7d0bf1913921f00f7d56bd92090fa857c5140ce3802575e53b3c062

  • SHA512

    c8e70effd6b68d5ad21815008b7756ec3854ad02f560783f5d9e3996ef02cc763a7cee52757a49be522ec395ec8e589769da716c718088b5290c85e2d5dff4a8

  • SSDEEP

    3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLv6BYMjMqqD:jOTcK+NrRioGHlz8rz0i/6BzQqqD

Score
10/10

Malware Config

Extracted

Family

netwire

C2

185.140.53.61:3363

185.140.53.61:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    move4ward

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 1276-66-0x0000000000400000-0x0000000000433000-memory.dmp
    .exe windows x86


    Headers

    Sections