General
-
Target
1640-78-0x0000000000400000-0x0000000000434000-memory.dmp
-
Size
208KB
-
Sample
220926-lmqnksbecn
-
MD5
e4db7211956908dda99d283d182f9dae
-
SHA1
1266382aa6c17b528adad67b7e8a64db775fa1a5
-
SHA256
f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60
-
SHA512
3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e
-
SSDEEP
3072:COzPcXa+ND32eioGHlz8rnAE0HCXh0edLvziYMjMqqDNV7Ff:COTcK+NrRioGHlz8rz0i/GzQqqDNZFf
Behavioral task
behavioral1
Sample
1640-78-0x0000000000400000-0x0000000000434000-memory.exe
Resource
win7-20220812-en
Malware Config
Extracted
netwire
fuckfuck0.ddns.net:3871
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-SmI2Ki
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
1640-78-0x0000000000400000-0x0000000000434000-memory.dmp
-
Size
208KB
-
MD5
e4db7211956908dda99d283d182f9dae
-
SHA1
1266382aa6c17b528adad67b7e8a64db775fa1a5
-
SHA256
f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60
-
SHA512
3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e
-
SSDEEP
3072:COzPcXa+ND32eioGHlz8rnAE0HCXh0edLvziYMjMqqDNV7Ff:COTcK+NrRioGHlz8rz0i/GzQqqDNZFf
-
NetWire RAT payload
-