General
-
Target
1884-71-0x0000000000400000-0x0000000000433000-memory.dmp
-
Size
204KB
-
Sample
220812-kavw4addb3
-
MD5
de17859851cd304ab1c24136ca09c7ef
-
SHA1
de52f7c28718f7237be4aa9afcabc541baa28070
-
SHA256
ea0fba1339f4c45676cd2323eac07a8e252e77236d35c8d7dafde5ec40b14d30
-
SHA512
35dc523bcd55399f0c2d70f1040329d42741e12ca2ea316bfd4dc4990af8da623aa7cf096b412623648ea1bcf6d0d84959ea4dc691a731ca30189b059c7a37c3
Behavioral task
behavioral1
Sample
1884-71-0x0000000000400000-0x0000000000433000-memory.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
1884-71-0x0000000000400000-0x0000000000433000-memory.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
netwire
212.193.30.230:3345
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password@9
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
1884-71-0x0000000000400000-0x0000000000433000-memory.dmp
-
Size
204KB
-
MD5
de17859851cd304ab1c24136ca09c7ef
-
SHA1
de52f7c28718f7237be4aa9afcabc541baa28070
-
SHA256
ea0fba1339f4c45676cd2323eac07a8e252e77236d35c8d7dafde5ec40b14d30
-
SHA512
35dc523bcd55399f0c2d70f1040329d42741e12ca2ea316bfd4dc4990af8da623aa7cf096b412623648ea1bcf6d0d84959ea4dc691a731ca30189b059c7a37c3
Score3/10 -