MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 af27173ed576215bb06dab3a1526992ee1f8bd358a92d63ad0cfbc0325c70acf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: af27173ed576215bb06dab3a1526992ee1f8bd358a92d63ad0cfbc0325c70acf
SHA3-384 hash: aac20d7b4af9157da6ff54083a0d270550d93ad67daa54abdaf885652a300bfe9eaa8211e5fc239a1c362e3eb0cc270b
SHA1 hash: 468957510d28035c81bc9ada3eeab4e9c217d84b
MD5 hash: 3232987f96ad8580ed62455d1e95df42
humanhash: leopard-six-ink-may
File name:3232987f96ad8580ed62455d1e95df42.exe
Download: download sample
Signature NetWire
File size:2'054'152 bytes
First seen:2021-11-28 17:45:54 UTC
Last seen:2021-11-28 19:38:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e8484af31853c6a880760961c4c18e01 (1 x NetWire)
ssdeep 49152:rsk3dB2F49gJf1PJWBUw4TfEFpuq5ZLSadHJXIWGjzQ5Mfk:rskNwKaJfNJWBUFTAu0ZLSadHJXIWGZk
Threatray 7'708 similar samples on MalwareBazaar
TLSH T1A0957C5175904067CFFB9630C909F237F3EDAD600A3E45F77790BA9B2A354424E2CA2A
File icon (PE):PE icon
dhash icon c8f4ecf8e8e884d4 (1 x NetWire)
Reporter abuse_ch
Tags:exe NetWire RAT signed

Code Signing Certificate

Organisation:AA PLUS INVEST d.o.o.
Issuer:Sectigo Public Code Signing CA R36
Algorithm:sha384WithRSAEncryption
Valid from:2021-09-13T00:00:00Z
Valid to:2022-09-13T23:59:59Z
Serial number: 2d8cfcf04209dc7f771d8d18e462c35a
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: b285167fc4c4497fc1b04716d32f7a4cf3778d71c5f6624621f76cd30dfc8e8e
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
NetWire C2:
51.195.57.232:3369

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
51.195.57.232:3369 https://threatfox.abuse.ch/ioc/255860/

Intelligence


File Origin
# of uploads :
2
# of downloads :
433
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3232987f96ad8580ed62455d1e95df42.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-28 17:50:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
87 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes
Found malware configuration
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Xwizard DLL Sideloading
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 529950 Sample: R0TIV63Wun.exe Startdate: 28/11/2021 Architecture: WINDOWS Score: 87 49 Multi AV Scanner detection for domain / URL 2->49 51 Found malware configuration 2->51 53 Multi AV Scanner detection for dropped file 2->53 55 5 other signatures 2->55 7 R0TIV63Wun.exe 2->7         started        10 R0TIV63Wun.exe 2->10         started        process3 signatures4 57 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->57 59 Writes to foreign memory regions 7->59 61 Allocates memory in foreign processes 7->61 12 cmd.exe 1 7->12         started        15 xwizard.exe 2 7->15         started        18 cmd.exe 1 7->18         started        63 Maps a DLL or memory area into another process 10->63 20 cmd.exe 1 10->20         started        22 cmd.exe 1 10->22         started        24 xwizard.exe 10->24         started        process5 dnsIp6 65 Uses schtasks.exe or at.exe to add and modify task schedules 12->65 26 xcopy.exe 4 12->26         started        29 conhost.exe 12->29         started        47 amimegutadowntown.com 51.195.57.232, 3369, 49789 OVHFR France 15->47 67 Contains functionality to log keystrokes 15->67 31 conhost.exe 18->31         started        33 schtasks.exe 1 18->33         started        35 conhost.exe 20->35         started        37 xcopy.exe 1 20->37         started        39 conhost.exe 22->39         started        41 schtasks.exe 1 22->41         started        signatures7 process8 file9 43 C:\Program Files (x86)\...\R0TIV63Wun.exe, PE32 26->43 dropped 45 C:\...\R0TIV63Wun.exe:Zone.Identifier, ASCII 26->45 dropped
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-11-04 02:54:00 UTC
File Type:
PE (Exe)
Extracted files:
44
AV detection:
3 of 45 (6.67%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet rat stealer
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
NetWire RAT payload
Netwire
Unpacked files
SH256 hash:
af27173ed576215bb06dab3a1526992ee1f8bd358a92d63ad0cfbc0325c70acf
MD5 hash:
3232987f96ad8580ed62455d1e95df42
SHA1 hash:
468957510d28035c81bc9ada3eeab4e9c217d84b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments