MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9407b4a736fe6f81101adb5a2e66bdd35171d9f15e756fd90a50a3e86a35d71d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 9407b4a736fe6f81101adb5a2e66bdd35171d9f15e756fd90a50a3e86a35d71d
SHA3-384 hash: 51aca5f74725394fe6dc8bbd0f6d3cda344a76b4295930f39f1dde526b7eaf69611a12ae6c408cd2331191dee03db412
SHA1 hash: c8c3d6a7e3e034312a29b006a97f9a8eb672a6a6
MD5 hash: d68c3a1672db1474e735e09a848f6033
humanhash: oranges-pasta-muppet-mars
File name:Inv-1045005852.vbs
Download: download sample
Signature NetWire
File size:2'115 bytes
First seen:2022-03-24 18:54:16 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 48:Glb8oaZU+zBL52oZqrn4EE8Rh3bNfJDLhTxgdv3k:GlJc7BsocrnDnrNJPF88
Threatray 3'120 similar samples on MalwareBazaar
TLSH T1D24112EE314FB5764B130EF6EC1B586E1861A242DA3D6880B205EBC92E3021D9757D6D
Reporter abuse_ch
Tags:NetWire vbs


Avatar
abuse_ch
Payload URL:
http://geiger.si/slike/ann/nmbv1.jpg

Intelligence


File Origin
# of uploads :
1
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to steal Chrome passwords or cookies
Drops PE files to the startup folder
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: NetWire RAT Registry Key
Uses dynamic DNS services
Very long command line found
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 596527 Sample: Inv-1045005852.vbs Startdate: 24/03/2022 Architecture: WINDOWS Score: 100 31 toshiba1122.duckdns.org 2->31 33 toshiba1122.ddns.net 2->33 53 Multi AV Scanner detection for domain / URL 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 Antivirus detection for URL or domain 2->57 59 4 other signatures 2->59 8 wscript.exe 1 2->8         started        11 iexplore.exe 1 73 2->11         started        13 wscript.exe 2->13         started        signatures3 process4 signatures5 61 Wscript starts Powershell (via cmd or directly) 8->61 63 Very long command line found 8->63 15 powershell.exe 14 19 8->15         started        19 powershell.exe 12 8->19         started        21 iexplore.exe 29 11->21         started        process6 dnsIp7 41 geiger.si 91.185.211.58, 49770, 80 TELEMACH-HOSTINGSI Slovenia 15->41 45 Writes to foreign memory regions 15->45 47 Injects a PE file into a foreign processes 15->47 23 RegAsm.exe 15->23         started        27 conhost.exe 15->27         started        49 Drops VBS files to the startup folder 19->49 51 Drops PE files to the startup folder 19->51 29 conhost.exe 19->29         started        43 kinmirai.org 133.130.104.18, 443, 49765, 49766 INTERQGMOInternetIncJP Japan 21->43 signatures8 process9 dnsIp10 35 toshiba1122.ddns.net 194.5.98.59, 3360, 49782, 49783 DANILENKODE Netherlands 23->35 37 toshiba1122.duckdns.org 23->37 39 192.168.2.1 unknown unknown 23->39 65 Contains functionality to steal Chrome passwords or cookies 23->65 signatures11
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments