General
-
Target
1752-71-0x0000000000400000-0x0000000000433000-memory.dmp
-
Size
204KB
-
Sample
220830-jgxtladgep
-
MD5
35da342ae086253c5e72048f6da8c463
-
SHA1
265cdb73ff3e96f744d28a39039ca7b87c69d392
-
SHA256
e9df4db33b6f76b55221549ab8bd067401cbaab1b0913ca9e51cae2686046adc
-
SHA512
8cf5a99238c4f26bc27fb9f1d797fd58b46a88a0f3e71e82d0dc5aa577c965dbc4eb90ba6d66c14e17241844e8f6c73737152f9bc6c2f0476a3c7d46e6ff1a57
-
SSDEEP
3072:S3bwUUCZjY/UURTbaiceGUlzFr0qOnZEcsx8VLJFYMSMqqD:S3kUjJY/fRT+iceGUlzFruZdJFzxqqD
Behavioral task
behavioral1
Sample
1752-71-0x0000000000400000-0x0000000000433000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1752-71-0x0000000000400000-0x0000000000433000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
netwire
212.193.30.230:3363
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password@2
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
1752-71-0x0000000000400000-0x0000000000433000-memory.dmp
-
Size
204KB
-
MD5
35da342ae086253c5e72048f6da8c463
-
SHA1
265cdb73ff3e96f744d28a39039ca7b87c69d392
-
SHA256
e9df4db33b6f76b55221549ab8bd067401cbaab1b0913ca9e51cae2686046adc
-
SHA512
8cf5a99238c4f26bc27fb9f1d797fd58b46a88a0f3e71e82d0dc5aa577c965dbc4eb90ba6d66c14e17241844e8f6c73737152f9bc6c2f0476a3c7d46e6ff1a57
-
SSDEEP
3072:S3bwUUCZjY/UURTbaiceGUlzFr0qOnZEcsx8VLJFYMSMqqD:S3kUjJY/fRT+iceGUlzFruZdJFzxqqD
Score3/10 -