Behavioral task
behavioral1
Sample
1640-78-0x0000000000400000-0x0000000000434000-memory.exe
Resource
win7-20220812-en
2 signatures
150 seconds
General
-
Target
1640-78-0x0000000000400000-0x0000000000434000-memory.dmp
-
Size
208KB
-
MD5
e4db7211956908dda99d283d182f9dae
-
SHA1
1266382aa6c17b528adad67b7e8a64db775fa1a5
-
SHA256
f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60
-
SHA512
3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e
-
SSDEEP
3072:COzPcXa+ND32eioGHlz8rnAE0HCXh0edLvziYMjMqqDNV7Ff:COTcK+NrRioGHlz8rz0i/GzQqqDNZFf
Malware Config
Extracted
Family |
netwire |
C2 |
fuckfuck0.ddns.net:3871 |
Attributes |
activex_autorun false
copy_executable false
delete_original false
host_id HostId-SmI2Ki
keylogger_dir C:\Users\Admin\AppData\Roaming\Logs\
lock_executable false
offline_keylogger true
password Password
registry_autorun false
use_mutex false |
Signatures
Files
-
1640-78-0x0000000000400000-0x0000000000434000-memory.dmp.exe windows x86