General

  • Target

    1380-69-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • Sample

    220810-rsnztsbdap

  • MD5

    d67909b88dd9e940a95e1f412b63369d

  • SHA1

    21a713590c1f0b40106118a279a1ac57d1cff304

  • SHA256

    03f455af123c32e5cffeb4cc6c730b7f5fabc63a94114ff12d401bfe28612966

  • SHA512

    53776dd3b02f4b006b9a11b2bd290013c65dd023c0fd9e93484255ea113bff73f777cf4ff4bc97a51fba63a9e9616494b99969b56ca4e5ea820b50a84219c60b

Score
10/10

Malware Config

Extracted

Family

netwire

C2

194.5.98.188:3364

194.5.98.188:3366

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    j5m52xuc

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      1380-69-0x0000000000400000-0x0000000000433000-memory.dmp

    • Size

      204KB

    • MD5

      d67909b88dd9e940a95e1f412b63369d

    • SHA1

      21a713590c1f0b40106118a279a1ac57d1cff304

    • SHA256

      03f455af123c32e5cffeb4cc6c730b7f5fabc63a94114ff12d401bfe28612966

    • SHA512

      53776dd3b02f4b006b9a11b2bd290013c65dd023c0fd9e93484255ea113bff73f777cf4ff4bc97a51fba63a9e9616494b99969b56ca4e5ea820b50a84219c60b

    Score
    3/10

MITRE ATT&CK Matrix

Tasks