MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9257415575d2a485de9787466a10636a920134f18dd617231373173dc88a6a20. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 9257415575d2a485de9787466a10636a920134f18dd617231373173dc88a6a20
SHA3-384 hash: 8610387596042a652efdbc96bd314538a3b9bc3cf5bd0a8a33484cc1f82aab156b49d8439a79761d0dc0f2364bd0f709
SHA1 hash: 00e3f9240126745835d198b5630181c03c842206
MD5 hash: cb4ea89ee0970861ea028bd55baa255b
humanhash: grey-xray-echo-fanta
File name:9257415575d2a485de9787466a10636a920134f18dd617231373173dc88a6a20
Download: download sample
Signature NetWire
File size:3'208'248 bytes
First seen:2020-07-16 12:32:31 UTC
Last seen:2020-07-16 14:07:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 842121112e43ecb3dfa6c2308396e8f7 (1 x NetWire)
ssdeep 49152:3VTMVdgF1aykvwhkSdcg5ZRFnWYRsdvzh:lgVykvcjnWYiv1
Threatray 298 similar samples on MalwareBazaar
TLSH 5FE56C22B685553EC45B0F35097BAA709A3FBB723A12C91B57F40C4C8FB65607D3A24B
Reporter JAMESWT_WT
Tags:badcert NetWire RAT signed

Code Signing Certificate

Organisation:UNITEKH-S
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:May 21 00:00:00 2020 GMT
Valid to:May 21 23:59:59 2021 GMT
Serial number: 62205361A758B00572D417CBA014F007
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 83E851E8C50F9D7299363181F2275EDC194037BE8CB6710762D2099E0B3F31C6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Launching cmd.exe command interpreter
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Moving a file to the %AppData% subdirectory
Unauthorized injection to a system process
Enabling autorun with Startup directory
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Allocates memory in foreign processes
Hijacks the control flow in another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-07-15 09:42:55 UTC
File Type:
PE (Exe)
Extracted files:
25
AV detection:
28 of 48 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments