General

  • Target

    1156-67-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • MD5

    9258f38e12d332dfc1eadd3b0b468d85

  • SHA1

    12018708b2ded2384a647ad38c0a3dea1fae8933

  • SHA256

    cc497237c7ae284f1cc7cdff63191b0ac9a33d2094ea2cbf7efaabbd3727cd0b

  • SHA512

    d4a99edbace9330619a87af09ea724ab9d96cae50a9169ac6d6deae08aec617b044642b79ffec82ea34cae9bd79f7d7a4e2b0a5e4f7ba88a507bbf15daa97765

  • SSDEEP

    3072:S3bwUUCZjY/UURTbaiceGUlzFr0qOnZEcsx8VLJoeYMSMqqD:S3kUjJY/fRT+iceGUlzFruZdJNzxqqD

Score
10/10

Malware Config

Extracted

Family

netwire

C2

194.5.98.194:3384

194.5.98.194:3387

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    goodnews1234

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 1156-67-0x0000000000400000-0x0000000000433000-memory.dmp
    .exe windows x86


    Headers

    Sections