General

  • Target

    1640-78-0x0000000000400000-0x0000000000434000-memory.dmp

  • Size

    208KB

  • Sample

    220926-lmqnksbecn

  • MD5

    e4db7211956908dda99d283d182f9dae

  • SHA1

    1266382aa6c17b528adad67b7e8a64db775fa1a5

  • SHA256

    f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60

  • SHA512

    3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e

  • SSDEEP

    3072:COzPcXa+ND32eioGHlz8rnAE0HCXh0edLvziYMjMqqDNV7Ff:COTcK+NrRioGHlz8rz0i/GzQqqDNZFf

Malware Config

Extracted

Family

netwire

C2

fuckfuck0.ddns.net:3871

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-SmI2Ki

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      1640-78-0x0000000000400000-0x0000000000434000-memory.dmp

    • Size

      208KB

    • MD5

      e4db7211956908dda99d283d182f9dae

    • SHA1

      1266382aa6c17b528adad67b7e8a64db775fa1a5

    • SHA256

      f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60

    • SHA512

      3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e

    • SSDEEP

      3072:COzPcXa+ND32eioGHlz8rnAE0HCXh0edLvziYMjMqqDNV7Ff:COTcK+NrRioGHlz8rz0i/GzQqqDNZFf

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

MITRE ATT&CK Matrix

Tasks