MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6758299aa38548e854ba372cea8a99d20578059a34d2572d3d4fc8bc76362186. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NetWire
Vendor detections: 15
| SHA256 hash: | 6758299aa38548e854ba372cea8a99d20578059a34d2572d3d4fc8bc76362186 |
|---|---|
| SHA3-384 hash: | c62ebbb8093b484fbb049c5b11c67fc20c645c25f13ba058bb582d4d1880d11d4f3cf203b2153caeb6d9bd4030986a1c |
| SHA1 hash: | a64e165ab3a61a15ea4626f18d44b05bacd703b2 |
| MD5 hash: | 2f3c785c61316024dfd1d11eafefedc6 |
| humanhash: | artist-thirteen-low-triple |
| File name: | 6758299aa38548e854ba372cea8a99d20578059a34d2572d3d4fc8bc76362186 |
| Download: | download sample |
| Signature | NetWire |
| File size: | 1'389'632 bytes |
| First seen: | 2022-03-23 08:05:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYz:8u0c++OCvkGs9Fa+rd1f26RaYz |
| Threatray | 9'105 similar samples on MalwareBazaar |
| TLSH | T17355BF52E39EC2F0DE165172BA7DF71A2F3F3C254530B956AFC52D3AAD21021112DAA3 |
| File icon (PE): | |
| dhash icon | c4c0ccc8ccf4d4fc (23 x NetWire, 14 x AveMariaRAT, 11 x Formbook) |
| Reporter | |
| Tags: | exe NetWire |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). |
| Rule name: | AveMaria |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies AveMaria aka WarZone RAT. |
| Rule name: | AveMaria_WarZone |
|---|
| Rule name: | ave_maria_warzone_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | Codoso_Gh0st_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Codoso APT Gh0st Malware |
| Reference: | https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks |
| Rule name: | Codoso_Gh0st_1_RID2C2D |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Codoso APT Gh0st Malware |
| Reference: | https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks |
| Rule name: | Codoso_Gh0st_2 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Codoso APT Gh0st Malware |
| Reference: | https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks |
| Rule name: | Codoso_Gh0st_2_RID2C2E |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Codoso APT Gh0st Malware |
| Reference: | https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks |
| Rule name: | malware_netwire_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect netwire in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_AveMaria |
|---|---|
| Author: | ditekSHen |
| Description: | AveMaria variant payload |
| Rule name: | MALWARE_Win_WarzoneRAT |
|---|---|
| Author: | ditekSHen |
| Description: | Detects AveMaria/WarzoneRAT |
| Rule name: | netwire |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | RDPWrap |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies RDP Wrapper, sometimes used by attackers to maintain persistence. |
| Reference: | https://github.com/stascorp/rdpwrap |
| Rule name: | win_ave_maria_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.ave_maria. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.