MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a521bd7e14bd3f373c03a13487b5ec4156c9b59bcf7751db5b6fded58d4825d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: a521bd7e14bd3f373c03a13487b5ec4156c9b59bcf7751db5b6fded58d4825d3
SHA3-384 hash: 9dfe908ed35c17de366850998e0415cae11f3730dfa75f045f34f2f670587107caea988d1ae5ceb1a2ddead43c8458f2
SHA1 hash: 84b95b2e05bb14212c6688d4a82486bc1932dae6
MD5 hash: 9b878d9209ed90815bc3bc06a842dd4c
humanhash: undress-double-march-aspen
File name:Bank_details.exe
Download: download sample
Signature NetWire
File size:2'833'056 bytes
First seen:2020-07-07 08:43:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9f2de36faf921ad0c138b3f99bf41cbc (2 x FormBook, 2 x NetWire, 1 x AveMariaRAT)
ssdeep 49152:zMPdZHquV9hd43k/R/I2iPfvlrbL7rbV8scM8scM8s1XSYXH3nXH3nXH3nXH3n0+:zMVZtJiPfvlrbL7rbV8scM8scM8sZXHx
Threatray 300 similar samples on MalwareBazaar
TLSH 78D5E156F5C2FA3FC2A65AFCCD7A12C49A14FF401626CC8722F83D29896E540F5C7269
Reporter abuse_ch
Tags:exe NetWire


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: shbc10.ultina.jp
Sending IP: 218.40.207.10
From: accounts@seagoldlog.com
Subject: Outstanding payment
Attachment: Bank_details.rar (contains "Bank_details.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Trojan.RemcosCrypt
Status:
Malicious
First seen:
2020-07-07 08:45:07 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
persistence botnet stealer family:netwire
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Netwire
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe a521bd7e14bd3f373c03a13487b5ec4156c9b59bcf7751db5b6fded58d4825d3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments