Behavioral task
behavioral1
Sample
2228-146-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2228-146-0x0000000000400000-0x0000000000450000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2228-146-0x0000000000400000-0x0000000000450000-memory.dmp
-
Size
320KB
-
MD5
01af822caa3a61abdd6701a4f6c3244e
-
SHA1
ac680f4eafa3d4b93c8227050512f38047a45eb1
-
SHA256
6af84f4d6b5cd133154908655654fd2d00dfdbf2a27c49c242755bee3b74d6ea
-
SHA512
47d6eb420ff434ea63a89b1c2e921858e235f4e6cc0d98f60a3eb38baadf6ee5ba6988cf2ba59833689b82dccc12c2d5517239590d18ad47d8798d82fd6ec4d0
-
SSDEEP
6144:ebhnot4+sbOAtbkfHLDiT6OzR8Q0l+/NyqRKbhoXqqD8XV8B:elnot4+UwLDiT6OzR8llAgqPB
Malware Config
Extracted
netwire
bigman2021.duckdns.org:3303
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
Files
-
2228-146-0x0000000000400000-0x0000000000450000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ