Behavioral task
behavioral1
Sample
2004-55-0x0000000000080000-0x00000000000AC000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2004-55-0x0000000000080000-0x00000000000AC000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
2004-55-0x0000000000080000-0x00000000000AC000-memory.dmp
-
Size
176KB
-
MD5
08c2fec1606013fea7dd692846e24db5
-
SHA1
8f3648532cf928b39926009678980a6919b9dfd9
-
SHA256
a0d762b4a3019ac571167f8b209b96282f5a99ee55fe85f4ca99c8ef18fa0269
-
SHA512
f4a4aa748038498feea58e1483403dc3f41449ae52de5ad570d0262725e03be899ca61ce88143d0574486e7c4cb545c9bbb7005fa2ce5ea9f3c5603c37cfaa36
-
SSDEEP
1536:X91zSkaCLFEFBa7Fc7qT29z6auDH9PuR14rekHsSlzQ/Lzc9LQIZG:X91JaCLFEPa7FeW2YaeHmmTvk/LwdZG
Malware Config
Extracted
netwire
halwachi50.mymediapc.net:5868
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
Files
-
2004-55-0x0000000000080000-0x00000000000AC000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 25KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 49B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ