General

  • Target

    4644-140-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • Sample

    220804-qjz53agccl

  • MD5

    495e75e0df978e42aaf71c3f68c3d21a

  • SHA1

    54cd4741d32f80a310ffaf5618d7bcec6480c66f

  • SHA256

    da763f27af4f33a096549313c7d4594d2dd3136a15ec74421b921f106550b1d3

  • SHA512

    2c83e2cbd6aa97353908db77066cc3ed9c6a8d4bae7d23131f42655de07a2d49be862a6604d607997a5a52799a0b2dc146fc7cb0da98ecb878f0c8989ffa7752

Score
10/10

Malware Config

Extracted

Family

netwire

C2

185.140.53.61:3363

185.140.53.61:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    move4ward

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      4644-140-0x0000000000400000-0x0000000000433000-memory.dmp

    • Size

      204KB

    • MD5

      495e75e0df978e42aaf71c3f68c3d21a

    • SHA1

      54cd4741d32f80a310ffaf5618d7bcec6480c66f

    • SHA256

      da763f27af4f33a096549313c7d4594d2dd3136a15ec74421b921f106550b1d3

    • SHA512

      2c83e2cbd6aa97353908db77066cc3ed9c6a8d4bae7d23131f42655de07a2d49be862a6604d607997a5a52799a0b2dc146fc7cb0da98ecb878f0c8989ffa7752

    Score
    1/10

MITRE ATT&CK Matrix

Tasks