MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 762917ae4ded0b505e288f8dbc4cb11e7dca42584c6a748d283083ebae3a1d94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NetWire
Vendor detections: 14
| SHA256 hash: | 762917ae4ded0b505e288f8dbc4cb11e7dca42584c6a748d283083ebae3a1d94 |
|---|---|
| SHA3-384 hash: | d52de80d19fc799012930470a2b6129e4fd5d44143f67fef714eb4f2bab6397b08430c0a671e703f2de893179e5a728b |
| SHA1 hash: | 852b400fa89ba46ff6ec0a0d651e6ca4e9c85760 |
| MD5 hash: | 73370756378e6f56b9d55fe4fc63bd1f |
| humanhash: | butter-comet-king-july |
| File name: | SMS Template & Paid Invoices.com.exe |
| Download: | download sample |
| Signature | NetWire |
| File size: | 604'672 bytes |
| First seen: | 2022-09-15 11:45:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'645 x Formbook, 12'245 x SnakeKeylogger) |
| ssdeep | 12288:2lXlHkL9YWw+9c71aVZ5PKBKWG+oS17RcV:8hWFfKBKWF17RC |
| TLSH | T191D4946C7B413AB2FE2E9134C8124A257B230F13EA44698937CF21CA877B76D1F55E85 |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | c4c4c4ccfcccf670 (5 x AgentTesla, 4 x SnakeKeylogger, 4 x NetWire) |
| Reporter | |
| Tags: | exe NetWire RAT |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 37.0.14.197:3360 | https://threatfox.abuse.ch/ioc/849844/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
09ecefeba092b02d99a1e113987c66c383d3c0a3f4d15bf1d87990200401ed6b
762917ae4ded0b505e288f8dbc4cb11e7dca42584c6a748d283083ebae3a1d94
b753b5997557c0cd4758e3731da45e07b2836fd2fd4bc3a7d5e575e98a083aba
47fe8af42f4b7360f7d6dcd89b161c1bec308d6598c17262d8bf234e1871b39a
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | INDICATOR_EXE_Packed_Babel |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with Babel |
| Rule name: | INDICATOR_EXE_Packed_Dotfuscator |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with Dotfuscator |
| Rule name: | INDICATOR_EXE_Packed_dotNetProtector |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with dotNetProtector |
| Rule name: | INDICATOR_EXE_Packed_Goliath |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with Goliath |
| Rule name: | INDICATOR_EXE_Packed_SmartAssembly |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with SmartAssembly |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | MALWARE_Win_NetWire |
|---|---|
| Author: | ditekSHen |
| Description: | Detects NetWire RAT |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_netwire_w0 |
|---|---|
| Author: | Jean-Philippe Teissier / @Jipe_ |
| Description: | NetWiredRC |
| Rule name: | win_vigilant_cleaner_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.vigilant_cleaner. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.