MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 608ec84d6c6d1b552b0c77210475ead69a437d02cc688d60e798cf530c02897e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 608ec84d6c6d1b552b0c77210475ead69a437d02cc688d60e798cf530c02897e
SHA3-384 hash: 2796565b9c87d2b39b0dfd868e1f616489b66c4104e86c34da2b19a3a706a2021ba2d1951939f95ab8155bb956f9b7ba
SHA1 hash: 338cfd99ea1f344feae23805ee3a549dfd4b4e79
MD5 hash: 27058c216d332e3e2ed96892c4ac0b04
humanhash: ceiling-eighteen-violet-bravo
File name:BONATTI 18000229 IQ1201 WO 210000102767.exe
Download: download sample
Signature NetWire
File size:873'984 bytes
First seen:2020-08-17 19:06:53 UTC
Last seen:2020-08-18 05:29:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 639357242ed279ceaa4726408d2cc6d5 (10 x AgentTesla, 4 x Formbook, 3 x MassLogger)
ssdeep 12288:BHlYcrKanXHzeEjMx6p4ddVvjUip3GKfm8Lon+CyC0WUILwJ7U:BF7OuHzkK4d7403c8UnRUIsJw
Threatray 1'810 similar samples on MalwareBazaar
TLSH 3B05AE22B1E34837D0B22A785C1F72A89836BF1039FF99477BE47D088E396513565E87
Reporter abuse_ch
Tags:exe NetWire


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: mail.kulmanorders.com
Sending IP: 107.158.163.9
From: Bonatti International Company <info@kulmanorders.com>
Reply-To: Bonatti International Company <milene.yuchi@gmail.com>
Subject: RFQ BONATTI 18000229 IQ1201 WO 210000102767
Attachment: Bonatti Order 17.08.2020.iso (contains "BONATTI 18000229 IQ1201 WO 210000102767.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
290
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Deleting a recently created file
Replacing files
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Internet Explorer form passwords
Creates files in alternative data streams (ADS)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Early bird code injection technique detected
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 269737 Sample: BONATTI 18000229 IQ1201 WO ... Startdate: 18/08/2020 Architecture: WINDOWS Score: 100 71 Yara detected NetWire RAT 2->71 73 Sigma detected: Drops script at startup location 2->73 75 Machine Learning detection for sample 2->75 14 BONATTI 18000229 IQ1201 WO 210000102767.exe 2->14         started        17 wscript.exe 1 2->17         started        process3 signatures4 115 Writes to foreign memory regions 14->115 117 Allocates memory in foreign processes 14->117 119 Queues an APC in another process (thread injection) 14->119 19 notepad.exe 5 14->19         started        23 NotpepadLite.exe 17->23         started        process5 file6 65 C:\Users\...65otpepadLite.exe:Zone.Identifier, ASCII 19->65 dropped 83 Creates files in alternative data streams (ADS) 19->83 85 Drops VBS files to the startup folder 19->85 25 NotpepadLite.exe 19->25         started        28 notepad.exe 19->28         started        87 Maps a DLL or memory area into another process 23->87 30 NotpepadLite.exe 23->30         started        signatures7 process8 signatures9 101 Detected unpacking (changes PE section rights) 25->101 103 Detected unpacking (overwrites its own PE header) 25->103 105 Contains functionality to log keystrokes 25->105 109 5 other signatures 25->109 32 NotpepadLite.exe 3 25->32         started        34 NotpepadLite.exe 28->34         started        107 Early bird code injection technique detected 30->107 37 GuiPaint.exe 30->37         started        process10 signatures11 39 GuiPaint.exe 32->39         started        77 Maps a DLL or memory area into another process 34->77 42 NotpepadLite.exe 34->42         started        79 Writes to foreign memory regions 37->79 81 Allocates memory in foreign processes 37->81 process12 signatures13 89 Machine Learning detection for dropped file 39->89 91 Writes to foreign memory regions 39->91 93 Allocates memory in foreign processes 39->93 95 Contains functionality to detect sleep reduction / modifications 39->95 44 notepad.exe 4 39->44         started        46 GuiPaint.exe 42->46         started        process14 signatures15 49 NotpepadLite.exe 44->49         started        121 Writes to foreign memory regions 46->121 123 Allocates memory in foreign processes 46->123 52 notepad.exe 46->52         started        process16 signatures17 69 Maps a DLL or memory area into another process 49->69 54 NotpepadLite.exe 2 49->54         started        56 NotpepadLite.exe 52->56         started        process18 signatures19 59 GuiPaint.exe 54->59         started        97 Maps a DLL or memory area into another process 56->97 99 Sample uses process hollowing technique 56->99 process20 signatures21 111 Writes to foreign memory regions 59->111 113 Allocates memory in foreign processes 59->113 62 notepad.exe 4 59->62         started        process22 file23 67 C:\Users\user\AppData\...67otpepadLite.exe, PE32 62->67 dropped
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-08-17 10:23:34 UTC
File Type:
PE (Exe)
Extracted files:
65
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
rat botnet stealer family:netwire
Behaviour
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Drops startup file
Loads dropped DLL
Executes dropped EXE
NetWire RAT payload
Netwire
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe 608ec84d6c6d1b552b0c77210475ead69a437d02cc688d60e798cf530c02897e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments