General

  • Target

    1640-78-0x0000000000400000-0x0000000000434000-memory.dmp

  • Size

    208KB

  • MD5

    e4db7211956908dda99d283d182f9dae

  • SHA1

    1266382aa6c17b528adad67b7e8a64db775fa1a5

  • SHA256

    f28d76b5dcb80a063022a86354c37ca3c8d159040d45666bb329e9f9dbe1ef60

  • SHA512

    3fbdbb7c31607fd6f6943ccc020c6521652cc87343ea8dfd1db79bc826721125ace3b690fa9d01fc49ca21cd5c1a525eb15dceb5aa8e2b70198a4ec89372bf0e

  • SSDEEP

    3072:COzPcXa+ND32eioGHlz8rnAE0HCXh0edLvziYMjMqqDNV7Ff:COTcK+NrRioGHlz8rz0i/GzQqqDNZFf

Score
10/10

Malware Config

Extracted

Family

netwire

C2

fuckfuck0.ddns.net:3871

Attributes
activex_autorun
false
copy_executable
false
delete_original
false
host_id
HostId-SmI2Ki
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
lock_executable
false
offline_keylogger
true
password
Password
registry_autorun
false
use_mutex
false

Signatures

  • NetWire RAT payload ⋅ 1 IoCs
  • Netwire family

Files

  • 1640-78-0x0000000000400000-0x0000000000434000-memory.dmp
    .exe windows x86