General

  • Target

    4592-354-0x0000000000400000-0x0000000000433000-memory.dmp

  • Size

    204KB

  • MD5

    a6dcdb0ffa967a01cc569211d5af2a15

  • SHA1

    49ffb9d97e7fca4084ed7591f894890127ecb2e5

  • SHA256

    93630bbe6f9cd64c0483931b408e38c7f8b624f010d730ac7163b94ceac08e8c

  • SHA512

    ff734eb7ccd2d5f5dedd37a37e421bbc59eedb9ae347beac1e59ceecc48a1b56cd36d8e3bd0d78ea15e42a10ddf5eae8ec0f5a56abd736c8cdb78e56561b3191

  • SSDEEP

    3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvCzYMjMqqD/FFf:jOTcK+NrRioGHlz8rz0i/+zQqqD/FFf

Score
10/10

Malware Config

Extracted

Family

netwire

C2

alice2019.myftp.biz:3366

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Fs_Spread_0002

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire family

Files

  • 4592-354-0x0000000000400000-0x0000000000433000-memory.dmp
    .exe windows x86


    Headers

    Sections