General

  • Target

    1772-96-0x0000000000270000-0x00000000007C4000-memory.dmp

  • Size

    5.3MB

  • MD5

    a270cb28f7021eb45c14d849634d8a79

  • SHA1

    e8ca33c36ee87fcb0fdae05df7433cfbf9518c40

  • SHA256

    e6d6d02074a713e108407b372bf7ccd2252ebe660cceb91490188ff0f46778dd

  • SHA512

    ef56a912e28b8a1c8c55ae81a8bd9dc1f634ec4400de6fc7046a592f3d4250ef645050e42d0cc1ea40308f323fb6eefcef01d3da2d0657ae523aa2636e3a8068

  • SSDEEP

    6144:qOkb+mgRHwNrcGel9srcVooez0qqDvFf:A+mgFuRroooQqR

Score
10/10

Malware Config

Extracted

Family

netwire

C2

37.0.14.206:3384

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    true

  • offline_keylogger

    true

  • password

    Password234

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 1772-96-0x0000000000270000-0x00000000007C4000-memory.dmp
    .exe windows x86


    Headers

    Sections