MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b5f9a952c4009061a21147103fc6d762c60e070fc588cab92846fc1c29679715. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: b5f9a952c4009061a21147103fc6d762c60e070fc588cab92846fc1c29679715
SHA3-384 hash: 0e1091fdfac98e1c562b80a4373ea25b8d736822b006dbae75156a14d3ecb4e022b1b3dcdec418d612b30e006954a97e
SHA1 hash: f54aa0b0a452ffba34bb154a467dbef3bf347fd9
MD5 hash: f13aa37174903d14951c141da29ec4bc
humanhash: mango-oscar-zebra-fanta
File name:cnf3669009.exe
Download: download sample
Signature NetWire
File size:640'512 bytes
First seen:2020-08-05 11:52:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2ff2dc860b3be78716db0209b9220e29 (4 x AgentTesla, 3 x HawkEye, 2 x NetWire)
ssdeep 12288:ZuAybmmRBkHgwNO+X85gTDTcKJQvcTP/1hZ5KvJUYhTGyp41/JCarVI8Pjka/bXm:5ybmMB501ag/Tc/07/zZ5KvJUDyp41/s
Threatray 411 similar samples on MalwareBazaar
TLSH 57D423D0D34574B6F10609B1571A89EB2382BA2A5C8A77160FEDDC067D37BC247837AB
Reporter abuse_ch
Tags:Caixa exe NetWire RAT t-online


Avatar
abuse_ch
Malspam distributing NetWire:

HELO: mailout08.t-online.de
Sending IP: 194.25.134.20
From: Buzón UAFE <fa.zajitschek@t-online.de>
Reply-To: Buzón UAFE <fa.zajitschek@t-online.de>
Subject: Caixa Confirming facturas TOTANA TSC INGINERA S L.
Attachment: cnf3669009.uue (contains "cnf3669009.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
339
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Sending a UDP request
Searching for the window
Deleting a recently created file
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Unauthorized injection to a recently created process
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Internet Explorer form passwords
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Maps a DLL or memory area into another process
Sigma detected: NetWire
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 257845 Sample: cnf3669009.exe Startdate: 05/08/2020 Architecture: WINDOWS Score: 84 65 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->65 67 Yara detected NetWire RAT 2->67 69 Sigma detected: NetWire 2->69 8 cnf3669009.exe 3 2 2->8         started        11 Host.exe 2->11         started        13 cnf3669009.exe 2->13         started        process3 signatures4 71 Contains functionality to log keystrokes 8->71 73 Contains functionality to steal Internet Explorer form passwords 8->73 75 Contains functionality to steal Chrome passwords or cookies 8->75 77 Contains functionality to detect sleep reduction / modifications 8->77 15 cnf3669009.exe 3 8->15         started        18 cnf3669009.exe 8->18         started        20 AcroRd32.exe 15 39 8->20         started        79 Maps a DLL or memory area into another process 11->79 22 Host.exe 11->22         started        24 Host.exe 11->24         started        26 cnf3669009.exe 13->26         started        28 cnf3669009.exe 13->28         started        process5 file6 57 C:\Users\user\AppData\Roaming\...\Host.exe, PE32 15->57 dropped 30 Host.exe 15->30         started        33 cnf3669009.exe 18->33         started        35 RdrCEF.exe 57 20->35         started        38 AcroRd32.exe 8 6 20->38         started        process7 dnsIp8 81 Maps a DLL or memory area into another process 30->81 83 Contains functionality to detect sleep reduction / modifications 30->83 40 Host.exe 3 30->40         started        43 Host.exe 30->43         started        45 cnf3669009.exe 33->45         started        47 cnf3669009.exe 33->47         started        59 192.168.2.1 unknown unknown 35->59 49 RdrCEF.exe 35->49         started        51 RdrCEF.exe 35->51         started        53 RdrCEF.exe 35->53         started        55 RdrCEF.exe 35->55         started        signatures9 process10 dnsIp11 61 43.226.229.43, 2030 SOFTLAYERUS Hong Kong 40->61 63 80.0.0.0 NTLGB United Kingdom 49->63
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-05 11:54:07 UTC
AV detection:
24 of 27 (88.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_netwire_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe b5f9a952c4009061a21147103fc6d762c60e070fc588cab92846fc1c29679715

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments