MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b4fd1b559d26c6cc80c050d47fae16aca871f04f766029567d78ed1d1cff3497. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NetWire
Vendor detections: 9
| SHA256 hash: | b4fd1b559d26c6cc80c050d47fae16aca871f04f766029567d78ed1d1cff3497 |
|---|---|
| SHA3-384 hash: | b22b5d25079b17cbf99c7907f099d5d9e8d0c01730e48cfdca34763e95ba2c7a1a3a9d7f9d63a6c93bc34823a7af8cc2 |
| SHA1 hash: | 6f7dee641baca760c3d1be043e6003f227f016a3 |
| MD5 hash: | 856df6ece76715db4b6eb3f28493c96a |
| humanhash: | queen-pip-avocado-quebec |
| File name: | b4fd1b559d26c6cc80c050d47fae16aca871f04f766029567d78ed1d1cff3497 |
| Download: | download sample |
| Signature | NetWire |
| File size: | 252'416 bytes |
| First seen: | 2020-11-13 15:50:41 UTC |
| Last seen: | 2024-07-24 20:35:20 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2c18218eed128fc50ed21df0c8227c3b (4 x NetWire, 4 x Tofsee) |
| ssdeep | 3072:RIoHBWS8kqaRJmhO/R6Ul1q3MnnzIzQRJ+G2lz/MdQg7Qkjjjjjjja:RTWS8C+hOA2q8nzqeJ/2J+Qg7QF |
| TLSH | 96349DD076E1C172C293443C1420D2A5253ABC2AEBB4C9A7F7D43F5B2DBD6E116B2356 |
| Reporter | |
| Tags: | NetWire |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
953d07a128e1a4f0d85284f228cbee9ea3cd3bd063b8b2646775dc95404d7b57
a1df406845736cfb09a009e68029d221696c2737c513127f9de4985493d2025f
d87f7d09890b145e414a26a250b2341e4d5ee5dd04faf359988988dfcf5f52c9
a0c1f8d3a65e0236068e42f67bccadf3af1f9e97b9d1ae1a4f4f6c98e9fd87af
c1422548aa23ee61a76af545be66bb152d65df911dc3949d66ea3bd4e2ac16e7
b4fd1b559d26c6cc80c050d47fae16aca871f04f766029567d78ed1d1cff3497
80e97bf5afa5364639185a51ee2f39c7a541368d6d32caab197284fd3e4b59eb
5d74709b07b9681993c7827f352f1c8eb75d4067e6b65cb1aa83480e3b694944
e9c3135cdbfbb9e59a1060b94c13913b02173e1f3ec98c0b3f3acaad177061b4
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Malicious_BAT_Strings |
|---|---|
| Author: | Florian Roth |
| Description: | Detects a string also used in Netwire RAT auxilliary |
| Reference: | https://pastebin.com/8qaiyPxs |
| Rule name: | MAL_unspecified_Jan18_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects unspecified malware sample |
| Reference: | Internal Research |
| Rule name: | netwire |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect netwire in memory |
| Reference: | internal research |
| Rule name: | Suspicious_BAT_Strings |
|---|---|
| Author: | Florian Roth |
| Description: | Detects a string also used in Netwire RAT auxilliary |
| Reference: | https://pastebin.com/8qaiyPxs |
| Rule name: | win_netwire_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.