MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cef2f777b4c29a5ced187382e3c0a0ee61d4c71471fc5d100b78a4e88f4324de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: cef2f777b4c29a5ced187382e3c0a0ee61d4c71471fc5d100b78a4e88f4324de
SHA3-384 hash: f04270b3eba770c6cc769d0f02ea8526b6fa65d81324e596b0bad6fea3de00750bf317051019f1d136fad46330b1b3ad
SHA1 hash: 5e3a464ce7ebaf297438e52dd6c9eaf374217eed
MD5 hash: 20e5be824638df2b4f86520d5a5a0cad
humanhash: aspen-jersey-oranges-arkansas
File name:FedEx Shipment.exe
Download: download sample
Signature NetWire
File size:756'224 bytes
First seen:2021-03-05 07:16:30 UTC
Last seen:2021-03-05 08:50:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:65g3ZRp9hYYNq6z/U+HZ5RzDiN7gv+UuQnTi+5vcmx+qywcnHG7Q/+hGZcS:+0ZRp9Rq6z/7XWN5UuQbvc7G8/+hGZ5
Threatray 377 similar samples on MalwareBazaar
TLSH ABF4F1C8B34036EEC929FE715B6E6DB067633CFADA123503501B762E8D7E2528921CD5
Reporter abuse_ch
Tags:exe FedEx NetWire RAT


Avatar
abuse_ch
Malspam distributing NetWire:

HELO: vps38947.servconfig.com
Sending IP: 144.208.66.19
From: FedEx <rvfwd@avalonjobs.net>
Subject: Your Parcel Delivery
Attachment: FedEx Shipment.img (contains "FedEx Shipment.exe")

NetWire RAT C2:
severdops.ddns.net:7390

Intelligence


File Origin
# of uploads :
2
# of downloads :
399
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FedEx Shipment.exe
Verdict:
Malicious activity
Analysis date:
2021-03-04 17:42:14 UTC
Tags:
rat netwire trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file in the %AppData% subdirectories
Creating a file
DNS request
Creating a window
Sending a custom TCP request
Sending a UDP request
Forced shutdown of a system process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to steal Chrome passwords or cookies
Detected unpacking (changes PE section rights)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NetWire
System process connects to network (likely due to code injection or exploit)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 363709 Sample: FedEx Shipment.exe Startdate: 05/03/2021 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Detected unpacking (changes PE section rights) 2->34 36 3 other signatures 2->36 6 FedEx Shipment.exe 1 4 2->6         started        10 cwd.exe 1 2->10         started        12 cwd.exe 2->12         started        process3 file4 22 C:\Users\user\AppData\Roaming\cwds\cwd.exe, PE32+ 6->22 dropped 24 C:\Users\user\...\cwd.exe:Zone.Identifier, ASCII 6->24 dropped 26 C:\Users\user\...\FedEx Shipment.exe.log, ASCII 6->26 dropped 38 Injects code into the Windows Explorer (explorer.exe) 6->38 40 Writes to foreign memory regions 6->40 42 Allocates memory in foreign processes 6->42 14 explorer.exe 2 6->14         started        44 Multi AV Scanner detection for dropped file 10->44 46 Detected unpacking (changes PE section rights) 10->46 48 Injects a PE file into a foreign processes 10->48 18 explorer.exe 10->18         started        20 explorer.exe 12->20         started        signatures5 process6 dnsIp7 28 severdops.ddns.net 103.151.123.132, 49734, 49753, 49756 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN unknown 14->28 50 Contains functionality to steal Chrome passwords or cookies 14->50 52 System process connects to network (likely due to code injection or exploit) 20->52 signatures8
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-05 01:10:19 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
18
AV detection:
14 of 47 (29.79%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet persistence rat stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
NetWire RAT payload
Netwire
Unpacked files
SH256 hash:
cef2f777b4c29a5ced187382e3c0a0ee61d4c71471fc5d100b78a4e88f4324de
MD5 hash:
20e5be824638df2b4f86520d5a5a0cad
SHA1 hash:
5e3a464ce7ebaf297438e52dd6c9eaf374217eed
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetWire

Executable exe cef2f777b4c29a5ced187382e3c0a0ee61d4c71471fc5d100b78a4e88f4324de

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments