MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7ec629a5196371b92017267aa3f51ad05d246bd72911bc24e4d2f47605e533b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 5


Intelligence 5 IOCs YARA 5 File information Comments

SHA256 hash: c7ec629a5196371b92017267aa3f51ad05d246bd72911bc24e4d2f47605e533b
SHA3-384 hash: 2f023de96f810644bdbdb7339ce73c355a8c346f8b3370c70b9b573890631147d25b5be6de785929715877bcb1950169
SHA1 hash: d8b107b0cb6bd2c29ed3a2c163e4a073dfc3292a
MD5 hash: 2ee330e8b1dec234bf214c2277b1b0fb
humanhash: east-violet-black-eleven
File name:URGENT_NEW_ORDER#4064406_pdf.exe
Download: download sample
Signature NetWire
File size:415'744 bytes
First seen:2020-05-18 08:48:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:b63e53HHeUsLiteEJD6Lp5ZGeNpEuVHLQOu1c6tlR222uXMewVTlmBq+rfQ:b63eJnetEt6DZGehVH7n+lY2RXQm9rf
Threatray 993 similar samples on MalwareBazaar
TLSH F6944C18F98394F5DD0AC831A49BFE5F56393E40B2A0CF9AEF5D1748DE0391E2725A18
Reporter abuse_ch
Tags:exe NetWire nVpn RAT


Avatar
abuse_ch
Malspam distributing NetWire:

HELO: server.linux99.papaki.gr
Sending IP: 78.46.83.231
From: Leon j <info2office@gmxnet.de>
Subject: dringende Bestellanfrage
Attachment: URGENT_NEW_ORDER4064406_pdf.7z (contains "URGENT_NEW_ORDER#4064406_pdf.exe")

NetWire RAT C2:
91.193.75.129:7707

Hosted on nVpn:

% Information related to '91.193.75.0 - 91.193.75.255'

% Abuse contact for '91.193.75.0 - 91.193.75.255' is 'abuse@kgb-vpn.org'

inetnum: 91.193.75.0 - 91.193.75.255
netname: NON-LOGGING-VPN-SERVICE
descr: Please note that we don't store any user data.
descr: Our main effort is not to make money, but to preserve values like the
descr: freedom of expression, the freedom of press, the right to data protection
descr: and informational self-determination.
descr: We ask all employees of Spamhaus and all self-proclaimed deputy sheriffs
descr: to stop your attacks against us.
country: EU
admin-c: KA7109-RIPE
tech-c: KA7109-RIPE
org: ORG-KHd1-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: KGB-MNT
mnt-routes: KGB-MNT
sponsoring-org: ORG-MW1-RIPE
created: 2012-06-04T11:05:55Z
last-modified: 2019-12-05T05:39:00Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-18 09:49:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
25 of 31 (80.65%)
Threat level:
  2/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire agilenet botnet rat stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Obfuscated with Agile.Net obfuscator
NetWire RAT payload
Netwire
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Malicious_BAT_Strings
Author:Florian Roth
Description:Detects a string also used in Netwire RAT auxilliary
Reference:https://pastebin.com/8qaiyPxs
Rule name:MAL_unspecified_Jan18_1
Author:Florian Roth
Description:Detects unspecified malware sample
Reference:Internal Research
Rule name:netwire
Author:JPCERT/CC Incident Response Group
Description:detect netwire in memory
Reference:internal research
Rule name:Suspicious_BAT_Strings
Author:Florian Roth
Description:Detects a string also used in Netwire RAT auxilliary
Reference:https://pastebin.com/8qaiyPxs
Rule name:win_netwire_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe c7ec629a5196371b92017267aa3f51ad05d246bd72911bc24e4d2f47605e533b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments