General

  • Target

    tmp

  • Size

    273KB

  • MD5

    8f98297f190db64c6c1bb9b85b78eca5

  • SHA1

    1bef5e61a3c11a8651870f3ad386f0a09f94de52

  • SHA256

    3adeefdaffda88ac8183d5c4164c9ad10b63c039c72fac187a596f4fcf906c00

  • SHA512

    193054828f611dc98410472d519618de039cdf33fd9611d7214d695f8328c718a7b444412e8de74ad7ab14ed922f52354dd73b3069acddea1942469062f6721b

  • SSDEEP

    6144:ebhnot4+sbOAtbkfHLDiT6OzR8Q0l+/NyqRKbhoXqqD8Xw8B:elnot4+UwLDiT6OzR8llAgqSB

Score
10/10

Malware Config

Extracted

Family

netwire

C2

ponchikvps.ddns.net:3677

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • tmp
    .exe windows x86

    e03c5ea8e25367650e1f4380ec0a6eaf


    Headers

    Imports

    Sections