General
-
Target
1440-66-0x00000000008D0000-0x00000000018D0000-memory.dmp
-
Size
16.0MB
-
Sample
220802-fc4vkabah7
-
MD5
fbc7f1a690af1d5dc8be54c41168f536
-
SHA1
5e87939b609b852436ce3b55b6ec3f0f9d3e86a9
-
SHA256
feeb1607e415dd4ef8b60e46b2e5535fed27634531922856bd6d7e4a614e6fea
-
SHA512
d2786ef876bdf4ffe8983f1b53bf317b5d8be991795c3a40f756f1295cf9c7323e06a03418a2fed44b59318044f2a60a1bea2fa21370606e8f48c9a942d72785
Behavioral task
behavioral1
Sample
1440-66-0x00000000008D0000-0x00000000018D0000-memory.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
1440-66-0x00000000008D0000-0x00000000018D0000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
banqueislamik.ddrive.online:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
SALUT
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
1440-66-0x00000000008D0000-0x00000000018D0000-memory.dmp
-
Size
16.0MB
-
MD5
fbc7f1a690af1d5dc8be54c41168f536
-
SHA1
5e87939b609b852436ce3b55b6ec3f0f9d3e86a9
-
SHA256
feeb1607e415dd4ef8b60e46b2e5535fed27634531922856bd6d7e4a614e6fea
-
SHA512
d2786ef876bdf4ffe8983f1b53bf317b5d8be991795c3a40f756f1295cf9c7323e06a03418a2fed44b59318044f2a60a1bea2fa21370606e8f48c9a942d72785
Score1/10 -