MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3daf55f37b276d2fc7e0b9e1a101d9445e3bb59fcd1d19a85c51efd48ecac37f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NetWire
Vendor detections: 3
| SHA256 hash: | 3daf55f37b276d2fc7e0b9e1a101d9445e3bb59fcd1d19a85c51efd48ecac37f |
|---|---|
| SHA3-384 hash: | 2bc1dcce26c193a1af984a782e5e2f44fd7ccb7bd3c8236b9ccc1f52a7f80f679d56bca12f53785ad2611f7503a2712d |
| SHA1 hash: | 6ae02c10e887472ee8a5f6776a074821cba0e07a |
| MD5 hash: | 4cb49a9ce780edbcfcca65c7618d78cd |
| humanhash: | colorado-fanta-cup-solar |
| File name: | 40% TT Transfer Swift_pdf.rar |
| Download: | download sample |
| Signature | NetWire |
| File size: | 747'264 bytes |
| First seen: | 2020-08-05 12:04:40 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:WcYSCPvBV0SmOr5nTOX5xfCIaK+4Vd5jisPZGoQfKAapEvsnC93F8iltnYMMLnPX:W/SO0SnnTOX5QIar4Vd1dufKjEvsC91a |
| TLSH | 49F42393825CD67FD80487C741E77C218AE30BB54B005FDB2D19BE0A99928BB36B7589 |
| Reporter | |
| Tags: | NetWire nVpn rar RAT |
abuse_ch
Malspam distributing NetWire:HELO: hinet.net
Sending IP: 176.123.10.138
From: gm@hinet.net
Subject: 40% TT Transfer Copy
Attachment: 40% TT Transfer Swift_pdf.rar (contains "40% TT Transfer Swift_pdf.exe")
NetWire RAT C2:
harromex.com:4020 (194.5.97.93)
Pointing to nVpn:
% Information related to '194.5.97.0 - 194.5.97.255'
% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@kgb-vpn.org'
inetnum: 194.5.97.0 - 194.5.97.255
netname: NET-NINAZU
remarks: ------------------------------------------
remarks: * This network is used for a VPN service.
remarks: * No logs are stored in any shape or form.
remarks: ------------------------------------------
country: EU
admin-c: NVS100-RIPE
tech-c: NVS100-RIPE
org: ORG-NVS2-RIPE
mnt-by: NINAZU-MNT
status: SUB-ALLOCATED PA
created: 2018-07-23T09:31:45Z
last-modified: 2020-08-02T13:13:48Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
300
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-08-05 12:06:07 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
NetWire
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.