Behavioral task
behavioral1
Sample
548-68-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
548-68-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
548-68-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
1b666262d4cf87b320c03d638784a168
-
SHA1
1886d498835bba95d7d21904c7605b8fd7fc54b1
-
SHA256
17e4159a9c87cf7f864f5cea45b79bf54bd913be4c4d542c23364b8daed57ff8
-
SHA512
443ac9fac51ee3888f7014f53d006ce97371b516212747afba49738052a28d1dee4a0ce5996709a3969ba3446041fc5983699a4392a98d48f1a72e82746284d9
-
SSDEEP
1536:b2giUJrMJvmpUMyB43RWKRaQ71XubjyKhkkIs1ZZsNIT/ODhw:b2LiQmpUbB4kKP1Xubjy4Is1ZwIgw
Malware Config
Extracted
netwire
sosclient.duckdns.org:9002
-
activex_autorun
true
-
activex_key
{OTGC73Q0-N4WA-4861-311L-BE075477ANH7}
-
copy_executable
false
-
delete_original
false
-
host_id
08-%Rand%
-
lock_executable
true
-
mutex
stostmDW
-
offline_keylogger
false
-
password
10203010Aa
-
registry_autorun
true
-
startup_name
Windows defender
-
use_mutex
true
Signatures
Files
-
548-68-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 25KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE