MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a6c78c463ea3f40ea7ae0532453f2a1c895f848b7b6dd0f3d40c723c67615e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 9a6c78c463ea3f40ea7ae0532453f2a1c895f848b7b6dd0f3d40c723c67615e9
SHA3-384 hash: 1b7b7722ad29ce6daf28beff3a33b0a746e5eff353d16d6599b81b0e30e6dc4c4996b45c84da87a70aafb9236c6e8a32
SHA1 hash: 207b75dfcdc5200fe7ef20d4472ba2e2400ec5cb
MD5 hash: 4a1ad23035b5f645a8fec94a9d650a2f
humanhash: romeo-april-emma-stream
File name:Entity ID.scr
Download: download sample
Signature NetWire
File size:250'368 bytes
First seen:2021-10-05 05:05:48 UTC
Last seen:2021-10-05 13:53:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 6144:IOTcK+NrRioGHlz8rz0i/MhzQqqDvFfcfQEnrthsIIC324:IK+Nr8MrYi/MDqRLEnrthsIIC5
Threatray 585 similar samples on MalwareBazaar
TLSH T1C0342A48F64771FEED4B8831999AFE2F5B707912C236CF03DE170989DE1E8568E046A1
Reporter fabjer
Tags:exe NetWire scr

Intelligence


File Origin
# of uploads :
2
# of downloads :
424
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Entity ID.scr
Verdict:
No threats detected
Analysis date:
2021-10-05 05:07:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a window
DNS request
Creating a file
Enabling the 'hidden' option for recently created files
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm evasive greyware keylogger obfuscated packed packed
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Drops PE files to the document folder of the user
Drops PE files with benign system names
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 496830 Sample: Entity ID.scr Startdate: 05/10/2021 Architecture: WINDOWS Score: 100 75 Multi AV Scanner detection for domain / URL 2->75 77 Found malware configuration 2->77 79 Antivirus / Scanner detection for submitted sample 2->79 81 9 other signatures 2->81 8 intel.exe 2 2->8         started        11 Entity ID.exe 1 6 2->11         started        14 intel.exe 1 2->14         started        process3 file4 83 Antivirus detection for dropped file 8->83 85 Multi AV Scanner detection for dropped file 8->85 87 Machine Learning detection for dropped file 8->87 16 svchost.exe 3 8->16         started        19 explorer.exe 8->19         started        55 C:\Users\user\Documents\INTEL\svchost.exe, PE32+ 11->55 dropped 57 C:\Users\user\Documents\INTEL\intel.exe, PE32+ 11->57 dropped 59 C:\Users\user\...\svchost.exe:Zone.Identifier, ASCII 11->59 dropped 61 2 other malicious files 11->61 dropped 89 Injects code into the Windows Explorer (explorer.exe) 11->89 91 Writes to foreign memory regions 11->91 93 Allocates memory in foreign processes 11->93 21 explorer.exe 2 11->21         started        95 Injects a PE file into a foreign processes 14->95 24 svchost.exe 1 14->24         started        26 explorer.exe 14->26         started        signatures5 process6 dnsIp7 65 Antivirus detection for dropped file 16->65 67 Multi AV Scanner detection for dropped file 16->67 69 Machine Learning detection for dropped file 16->69 28 intel.exe 1 16->28         started        31 intel.exe 16->31         started        33 intel.exe 16->33         started        35 2 other processes 16->35 63 info1.dynamic-dns.net 122.180.86.185, 3360 AIRTELBROADBAND-AS-APBhartiAirtelLtdTelemediaServices India 21->63 71 System process connects to network (likely due to code injection or exploit) 21->71 73 Contains functionality to steal Chrome passwords or cookies 21->73 signatures8 process9 signatures10 97 Injects code into the Windows Explorer (explorer.exe) 28->97 99 Writes to foreign memory regions 28->99 101 Allocates memory in foreign processes 28->101 37 explorer.exe 28->37         started        39 svchost.exe 28->39         started        103 Injects a PE file into a foreign processes 31->103 41 explorer.exe 31->41         started        43 svchost.exe 31->43         started        45 explorer.exe 33->45         started        47 svchost.exe 33->47         started        49 explorer.exe 35->49         started        51 svchost.exe 35->51         started        53 explorer.exe 35->53         started        process11
Threat name:
ByteCode-MSIL.Backdoor.NetWiredRc
Status:
Malicious
First seen:
2021-10-04 11:14:48 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet persistence rat stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
NetWire RAT payload
Netwire
Malware Config
C2 Extraction:
info1.dynamic-dns.net:3360
Unpacked files
SH256 hash:
9a6c78c463ea3f40ea7ae0532453f2a1c895f848b7b6dd0f3d40c723c67615e9
MD5 hash:
4a1ad23035b5f645a8fec94a9d650a2f
SHA1 hash:
207b75dfcdc5200fe7ef20d4472ba2e2400ec5cb
Detections:
win_netwire_auto win_netwire_g1
Malware family:
NetWiredRC
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:MALWARE_Win_NetWire
Author:ditekSHen
Description:Detects NetWire RAT
Rule name:win_netwire_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.netwire.
Rule name:win_netwire_w0
Author:Jean-Philippe Teissier / @Jipe_
Description:NetWiredRC

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe 9a6c78c463ea3f40ea7ae0532453f2a1c895f848b7b6dd0f3d40c723c67615e9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments