General

  • Target

    4592-354-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • Sample

    221125-cf1ersde97

  • MD5

    a6dcdb0ffa967a01cc569211d5af2a15

  • SHA1

    49ffb9d97e7fca4084ed7591f894890127ecb2e5

  • SHA256

    93630bbe6f9cd64c0483931b408e38c7f8b624f010d730ac7163b94ceac08e8c

  • SHA512

    ff734eb7ccd2d5f5dedd37a37e421bbc59eedb9ae347beac1e59ceecc48a1b56cd36d8e3bd0d78ea15e42a10ddf5eae8ec0f5a56abd736c8cdb78e56561b3191

  • SSDEEP

    3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvCzYMjMqqD/FFf:jOTcK+NrRioGHlz8rz0i/+zQqqD/FFf

Score
10/10

Malware Config

Extracted

Family

netwire

C2

alice2019.myftp.biz:3366

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Fs_Spread_0002

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Targets

    • Target

      4592-354-0x0000000000400000-0x0000000000433000-memory.dmp

    • Size

      204KB

    • MD5

      a6dcdb0ffa967a01cc569211d5af2a15

    • SHA1

      49ffb9d97e7fca4084ed7591f894890127ecb2e5

    • SHA256

      93630bbe6f9cd64c0483931b408e38c7f8b624f010d730ac7163b94ceac08e8c

    • SHA512

      ff734eb7ccd2d5f5dedd37a37e421bbc59eedb9ae347beac1e59ceecc48a1b56cd36d8e3bd0d78ea15e42a10ddf5eae8ec0f5a56abd736c8cdb78e56561b3191

    • SSDEEP

      3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvCzYMjMqqD/FFf:jOTcK+NrRioGHlz8rz0i/+zQqqD/FFf

    Score
    3/10

MITRE ATT&CK Matrix

Tasks