MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7af7b083ccaf83c1b1b4c7083b4c121472846f1b7343a0a83c883a8561fc62dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7af7b083ccaf83c1b1b4c7083b4c121472846f1b7343a0a83c883a8561fc62dc
SHA3-384 hash: 9abdd42f274a4b7a8af80ba00b79d6fdee628a058a8a37505f90e12e353531b96a2982196ab4b4e1458bc5305ec89d6c
SHA1 hash: f0a6ed4ef9576aaa3a19d067fddab7807b3a9bd7
MD5 hash: 96d38bc4a675ab2505806d9ea4df6bea
humanhash: november-robin-robert-cola
File name:Fiche de Poste.scr
Download: download sample
Signature NetWire
File size:465'920 bytes
First seen:2020-05-11 20:37:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e63ba35b0624acab11f4d58874178dd7 (1 x NetWire)
ssdeep 1536:3ZECjLuqs43N7b3U9OKEpH8bgtuON1npxmUbLiKonmV0xvlptTlKv:LJjZ1eaatptTy
Threatray 696 similar samples on MalwareBazaar
TLSH 53A481017AA4EC6EC4C97976CF60F2AECB62AC75587098337388774D0F729429D2426F
Reporter c_APT_ure
Tags:NetWire

Code Signing Certificate

Organisation:DigiCert SHA2 Assured ID Code Signing CA
Issuer:DigiCert Assured ID Root CA
Algorithm:sha256WithRSAEncryption
Valid from:Oct 22 12:00:00 2013 GMT
Valid to:Oct 22 12:00:00 2028 GMT
Serial number: 0409181B5FD5BB66755343B56F955008
Intelligence: 9 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 51044706BD237B91B89B781337E6D62656C69F0FCFFBE8E43741367948127862
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-05 22:50:32 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Checks QEMU agent state file
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments