General

  • Target

    756-70-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • MD5

    c3fe1aea5937b5991302217cafe1bc37

  • SHA1

    b2469fd75ce7a7b17f29ebb82a94b2d07d0d8a58

  • SHA256

    19ef108b6ee8dea60a19bf8dcbe0cadbde56a0638cc7cfdc45bf530857e2efe9

  • SHA512

    e9a12233d3d95d7724b7a2b7f9c6a6f59d00adcc279b163c956462eb3065279c16d0d13f39a6809dd01d45538638aaa9271540c6ef6474c8c6cc9780419103e2

  • SSDEEP

    3072:S3bwUUCZjY/UURTbaiceGUlzFr0qOnZEcsx8VLJFYMSMqqD:S3kUjJY/fRT+iceGUlzFruZdJFzxqqD

Score
10/10

Malware Config

Extracted

Family

netwire

C2

212.193.30.230:3363

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password@2

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 756-70-0x0000000000400000-0x0000000000433000-memory.dmp
    .exe windows x86


    Headers

    Sections