MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58afc43111bd508783f2010caef50731ac54f6e7841cc6715ac4b83a8ab5715f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 58afc43111bd508783f2010caef50731ac54f6e7841cc6715ac4b83a8ab5715f
SHA3-384 hash: 4afce96c517d4a489c689b310aae0716c5a664755f67debafc27b74bd964d34e0b901d998b0d3ca596f9229c7f98fd03
SHA1 hash: 1d4ac836ecb7df7fac04e77562b5b9d4b30df697
MD5 hash: 6a4e8dbad4bd58452d15a706ff60bea5
humanhash: lima-bakerloo-single-august
File name:SMS LOGS.COM
Download: download sample
Signature NetWire
File size:250'368 bytes
First seen:2021-10-08 09:40:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 6144:QVOTcK+NrRioGHlz8rz0i/MhzQqqDvFfLc9tPEt2lyOYVuBx:0K+Nr8MrYi/MDqRTcvst2lyOYVo
Threatray 592 similar samples on MalwareBazaar
TLSH T1E2342948F68771FEED4B8831959AFE2F5B607812C236CF03DE170989DE1EC568E146A1
Reporter madjack_red
Tags:exe NetWire

Intelligence


File Origin
# of uploads :
1
# of downloads :
496
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SMS LOGS.COM
Verdict:
No threats detected
Analysis date:
2021-10-08 09:43:41 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a window
DNS request
Creating a file
Enabling the 'hidden' option for recently created files
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm evasive greyware keylogger obfuscated packed packed
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Drops PE files to the document folder of the user
Drops PE files with benign system names
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 499421 Sample: SMS LOGS.COM Startdate: 08/10/2021 Architecture: WINDOWS Score: 100 88 Multi AV Scanner detection for domain / URL 2->88 90 Found malware configuration 2->90 92 Antivirus / Scanner detection for submitted sample 2->92 94 9 other signatures 2->94 8 dlt.exe 2 2->8         started        11 SMS LOGS.exe 1 6 2->11         started        14 dlt.exe 1 2->14         started        process3 file4 96 Antivirus detection for dropped file 8->96 98 Multi AV Scanner detection for dropped file 8->98 100 Machine Learning detection for dropped file 8->100 16 svchost.exe 3 8->16         started        19 explorer.exe 8->19         started        21 explorer.exe 8->21         started        30 2 other processes 8->30 58 C:\Users\user\Documents\Dlt\svchost.exe, PE32+ 11->58 dropped 60 C:\Users\user\Documents\Dlt\dlt.exe, PE32+ 11->60 dropped 62 C:\Users\user\...\svchost.exe:Zone.Identifier, ASCII 11->62 dropped 64 2 other malicious files 11->64 dropped 102 Injects code into the Windows Explorer (explorer.exe) 11->102 104 Writes to foreign memory regions 11->104 106 Allocates memory in foreign processes 11->106 23 explorer.exe 2 11->23         started        108 Injects a PE file into a foreign processes 14->108 26 svchost.exe 1 14->26         started        28 explorer.exe 14->28         started        signatures5 process6 dnsIp7 72 Antivirus detection for dropped file 16->72 74 Machine Learning detection for dropped file 16->74 32 dlt.exe 16->32         started        35 dlt.exe 1 16->35         started        37 dlt.exe 16->37         started        39 dlt.exe 16->39         started        66 info1.dynamic-dns.net 102.89.0.204, 3360 VCG-ASNG Nigeria 23->66 68 102.89.1.196, 3360 VCG-ASNG Nigeria 23->68 76 System process connects to network (likely due to code injection or exploit) 23->76 78 Contains functionality to steal Chrome passwords or cookies 23->78 signatures8 process9 dnsIp10 80 Injects code into the Windows Explorer (explorer.exe) 32->80 82 Writes to foreign memory regions 32->82 84 Allocates memory in foreign processes 32->84 42 explorer.exe 32->42         started        44 explorer.exe 32->44         started        46 svchost.exe 32->46         started        86 Injects a PE file into a foreign processes 35->86 48 explorer.exe 35->48         started        50 svchost.exe 35->50         started        52 explorer.exe 37->52         started        54 svchost.exe 37->54         started        70 192.168.2.1 unknown unknown 39->70 56 explorer.exe 39->56         started        signatures11 process12
Threat name:
ByteCode-MSIL.Backdoor.NetWiredRc
Status:
Malicious
First seen:
2021-10-08 02:34:00 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
4
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet persistence rat stealer
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
NetWire RAT payload
Netwire
Malware Config
C2 Extraction:
info1.dynamic-dns.net:3360
Unpacked files
SH256 hash:
58afc43111bd508783f2010caef50731ac54f6e7841cc6715ac4b83a8ab5715f
MD5 hash:
6a4e8dbad4bd58452d15a706ff60bea5
SHA1 hash:
1d4ac836ecb7df7fac04e77562b5b9d4b30df697
Detections:
win_netwire_auto win_netwire_g1
Malware family:
NetWiredRC
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:MALWARE_Win_NetWire
Author:ditekSHen
Description:Detects NetWire RAT
Rule name:win_netwire_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.netwire.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments