MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79a11cb21ee047550839c1bb8e4bd7d40c98b7fc8eb1faf5f71c06d8acadcdb5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 79a11cb21ee047550839c1bb8e4bd7d40c98b7fc8eb1faf5f71c06d8acadcdb5
SHA3-384 hash: d5304e216de702aa0218fb0066ec1917d5e04127ff7daa2c0bc201050c284cbf33a09ac234976bbf479019cd7fb3a6aa
SHA1 hash: e40e1699f9e45ac28ad373bd1b31a133e666aa28
MD5 hash: dafcece5e0ae55b75fc55d8380f50282
humanhash: nevada-mississippi-violet-four
File name:Underernringen.exe
Download: download sample
Signature NetWire
File size:69'632 bytes
First seen:2020-05-08 08:09:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 82d87a03c35c388258a4e2eb50b62a39 (1 x NetWire)
ssdeep 768:V1t77g9AgV5g8Xbs7467/S3N8AjXc/ZYd7QcB3vqiy:dk9VA7HSzjcZYNQcRi
Threatray 869 similar samples on MalwareBazaar
TLSH 8763393673D8E133DC944BF23A6E97E021E36CB845094D0F398E3B5E5539A86A06971F
Reporter abuse_ch
Tags:encrpyted GuLoader NetWire RAT


Avatar
abuse_ch
Excel (xls) -> GuLoader -> NetWire RAT

GuLoader payload URL:
http://securewedreesdsa3.ru/Underernringen.exe

NetWire payload URL:
http://stubbackup.ru/r4_FYUuBS170.bin

NetWire RAT C2:
79.124.8.7:1986

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Netwiredrc
Status:
Malicious
First seen:
2020-05-02 07:46:00 UTC
AV detection:
27 of 30 (90.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks QEMU agent state file
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe 79a11cb21ee047550839c1bb8e4bd7d40c98b7fc8eb1faf5f71c06d8acadcdb5

(this sample)

  
Dropping
NetWire
  
Delivery method
Distributed via web download

Comments