MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3db7b6003f173b4b0faff6725ce88a9db8d636fd431901ed32cccd494ff2a29e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 14


Intelligence 14 IOCs YARA 5 File information Comments

SHA256 hash: 3db7b6003f173b4b0faff6725ce88a9db8d636fd431901ed32cccd494ff2a29e
SHA3-384 hash: 20e682c8a6ba84c6a60b91ad96d88697908331da20f41253beaeb9465dbf2b61ff428c2d00ebcf52f43ae72ed15b800a
SHA1 hash: 9c3d7834864d91a4c55af108aeaaceba076e4323
MD5 hash: 5b4bc2b8be01558aa55a67d5208605d3
humanhash: indigo-may-beer-xray
File name:kit.exe
Download: download sample
Signature NetWire
File size:1'528'832 bytes
First seen:2022-03-23 18:02:45 UTC
Last seen:2022-03-24 06:17:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9b5dd8ae6c49e5fbd407dc1f346434cc (4 x RaccoonStealer, 2 x RedLineStealer, 2 x Stop)
ssdeep 24576:zg0IY3CyKgM0sfCx7VsJTzAAWKJrPzi1thEYDu1MoaI/WFKxCIXqO3:csKRfCDsprYhEY6qoH/eKFH
Threatray 1'288 similar samples on MalwareBazaar
TLSH T16D6523A65F11C67AD2FB7AB434009B65526E3CF60DE8C2CE36E513E849367C1D226B0D
File icon (PE):PE icon
dhash icon 5c599a3ce0c3c850 (43 x Stop, 37 x RedLineStealer, 36 x Smoke Loader)
Reporter Anonymous
Tags:exe NetWire

Intelligence


File Origin
# of uploads :
2
# of downloads :
333
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Query of malicious DNS domain
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult greyware hlux packed ransomware redline
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-03-23 18:04:48 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet rat stealer
Behaviour
NetWire RAT payload
Netwire
Unpacked files
SH256 hash:
24b1e2165ecff69110bc0e88dfa945efa681345eed25bda6431af0f3970c2772
MD5 hash:
9e3dabfa242cd95a710ee6677a430f5b
SHA1 hash:
f6823b4b021657a9fa5a1681aa8506bc38cbda4d
SH256 hash:
a5fa87969fe3b2a76f164e3ac6b2ba79f295a70f3225c461d1354b64c3e5b034
MD5 hash:
f2e967512c563ab6fce2385eb0d74467
SHA1 hash:
d32c80407af6d76c3bfdf33bf120a2e5073b24c0
Detections:
win_netwire_g1
SH256 hash:
3db7b6003f173b4b0faff6725ce88a9db8d636fd431901ed32cccd494ff2a29e
MD5 hash:
5b4bc2b8be01558aa55a67d5208605d3
SHA1 hash:
9c3d7834864d91a4c55af108aeaaceba076e4323
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:MALWARE_Win_NetWire
Author:ditekSHen
Description:Detects NetWire RAT
Rule name:MAL_unspecified_Jan18_1
Author:Florian Roth
Description:Detects unspecified malware sample
Reference:Internal Research
Rule name:MAL_unspecified_Jan18_1_RID2F4A
Author:Florian Roth
Description:Detects unspecified malware sample
Reference:Internal Research
Rule name:win_netwire_w0
Author:Jean-Philippe Teissier / @Jipe_
Description:NetWiredRC

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NetWire

Executable exe 3db7b6003f173b4b0faff6725ce88a9db8d636fd431901ed32cccd494ff2a29e

(this sample)

  
Delivery method
Distributed via web download

Comments