General
-
Target
2300-12-0x0000000000400000-0x000000000046D000-memory.dmp
-
Size
436KB
-
Sample
240417-sf6vjseg9y
-
MD5
3d6c6bff2e4b44e859015ba34b4db597
-
SHA1
38c97dfa13d7819fb035080778b66d8235a6d9fd
-
SHA256
b05bcd8ebd15f7e2863a1eab91933a06ff6846d89f1b43cb73abbe1c45f856f1
-
SHA512
c1ea8232340cfe40ea68d810b3f7ce2225b87018d64c4201de062a0462b642dfbd4322cf4d5a1da7780c9bd24403170158bb7f671dee5d10da5e22aad5f9ae5f
-
SSDEEP
12288:DAwZixvy9YaY1ItAytqq1IM4vxcvWGkae:Deq95Y12ntv1I9JcvW3a
Behavioral task
behavioral1
Sample
2300-12-0x0000000000400000-0x000000000046D000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2300-12-0x0000000000400000-0x000000000046D000-memory.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
netwire
dnsresoIve.ns01.US:15111
dnsresolve.srz2l6.com:15111
PLUGINUPDATES.duckdns.org:15111
updateavlocalgenuine.com:15111
localupdate.ns02.info:15111
dnsresolve.nsl1.cc:15111
dnsresolve.srs8l2.com:15111
-
activex_autorun
false
-
activex_key
{A3N5KUJ4-U7S4-6J45-1DJ6-32HM4W8Q0615}
-
copy_executable
false
-
delete_original
false
-
host_id
AVR-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
DuleX
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
2300-12-0x0000000000400000-0x000000000046D000-memory.dmp
-
Size
436KB
-
MD5
3d6c6bff2e4b44e859015ba34b4db597
-
SHA1
38c97dfa13d7819fb035080778b66d8235a6d9fd
-
SHA256
b05bcd8ebd15f7e2863a1eab91933a06ff6846d89f1b43cb73abbe1c45f856f1
-
SHA512
c1ea8232340cfe40ea68d810b3f7ce2225b87018d64c4201de062a0462b642dfbd4322cf4d5a1da7780c9bd24403170158bb7f671dee5d10da5e22aad5f9ae5f
-
SSDEEP
12288:DAwZixvy9YaY1ItAytqq1IM4vxcvWGkae:Deq95Y12ntv1I9JcvW3a
Score1/10 -