MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3101eed05f09d6c47096bfea7ffc2367a7f83325618b602b6e808bcfb9bd6989. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NetWire
Vendor detections: 11
| SHA256 hash: | 3101eed05f09d6c47096bfea7ffc2367a7f83325618b602b6e808bcfb9bd6989 |
|---|---|
| SHA3-384 hash: | 90ac48ddaae60ca50d5a0a0fd6416402694fd855313bfb306f1a1bfb02fa5e5bbfa9e9ac98d6fb3334059acc85954973 |
| SHA1 hash: | 0fccc8eea31a6ee0e17cb5c2f9cfddf8ad16f749 |
| MD5 hash: | deb4a84e3451fec595a0e56be5d0a99a |
| humanhash: | florida-lactose-uranus-foxtrot |
| File name: | Quotation.com |
| Download: | download sample |
| Signature | NetWire |
| File size: | 227'328 bytes |
| First seen: | 2021-01-12 18:10:18 UTC |
| Last seen: | 2021-01-12 19:49:13 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9b62b0722ac75232134d66c7d9d312c1 (3 x Formbook, 1 x NetWire, 1 x RemcosRAT) |
| ssdeep | 6144:SjS4mVbOZMGri6Sr18rtpAe+WmgLInNI1Yg:SUcrAr1qtpAeJmuInTg |
| Threatray | 581 similar samples on MalwareBazaar |
| TLSH | 4124F14E96A21036D0A162FA97910B37DC72B968331465D7FB9CAC76833FD91F5A100F |
| Reporter | |
| Tags: | com NetWire |
abuse_ch
Malspam distributing unidentified malware:HELO: slot0.cmpilthium.com
Sending IP: 45.85.90.178
From: office@cmpilthium.com
Subject: Re: Pedido de Cotação
Attachment: Quotation.iso (contains "Quotation.com")
Intelligence
File Origin
# of uploads :
2
# of downloads :
286
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Quotation.com
Verdict:
Malicious activity
Analysis date:
2021-01-12 18:39:00 UTC
Tags:
rat netwire trojan
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Netwire
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a file
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to steal Chrome passwords or cookies
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NetWire
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected NetWire RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.NetWiredRc
Status:
Malicious
First seen:
2021-01-12 18:11:10 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
netwirerc
Similar samples:
+ 571 additional samples on MalwareBazaar
Result
Malware family:
netwire
Score:
10/10
Tags:
family:netwire botnet persistence rat stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
NetWire RAT payload
Netwire
Unpacked files
SH256 hash:
3101eed05f09d6c47096bfea7ffc2367a7f83325618b602b6e808bcfb9bd6989
MD5 hash:
deb4a84e3451fec595a0e56be5d0a99a
SHA1 hash:
0fccc8eea31a6ee0e17cb5c2f9cfddf8ad16f749
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.92
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.