MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da91ebb2535be02b6cf046e0c03dbfc8e917794a997332d1c0d5cd134a476581. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 6 File information Comments

SHA256 hash: da91ebb2535be02b6cf046e0c03dbfc8e917794a997332d1c0d5cd134a476581
SHA3-384 hash: a85d9e901a687cb2ccc803ad3613c2e41ba1110fbf110ce4419c27644f5b33ca8bb8844169ce26c30203251a998ce2d1
SHA1 hash: 08d087c9f92a4d23cb9ecb2a02472255eddcbe13
MD5 hash: 8eb0b7aba5e4a91fae4767fb71606709
humanhash: speaker-pizza-shade-carpet
File name:RFQ USD 03142022.exe
Download: download sample
Signature NetWire
File size:1'107'456 bytes
First seen:2022-03-14 05:46:20 UTC
Last seen:2022-03-14 08:05:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:5TRiGwLLfMyidfazI5RYzbTyNS1+4cFcWVMoy+x:5TRMLrNidfFrsbTyEY4cA
Threatray 1'730 similar samples on MalwareBazaar
TLSH T1FC359EE4AB08567FDE71237AC1B811303EB61D4AA895FF295A8D32C84977F8F08D251D
Reporter abuse_ch
Tags:exe NetWire RAT


Avatar
abuse_ch
NetWire C2:
194.5.98.140:6969

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
194.5.98.140:6969 https://threatfox.abuse.ch/ioc/395091/

Intelligence


File Origin
# of uploads :
2
# of downloads :
351
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed replace.exe update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NetWire RAT Registry Key
Sigma detected: Suspicious Add Scheduled Task From User AppData Temp
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 588283 Sample: RFQ USD 03142022.exe Startdate: 14/03/2022 Architecture: WINDOWS Score: 100 34 Multi AV Scanner detection for domain / URL 2->34 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 14 other signatures 2->40 7 RFQ USD 03142022.exe 7 2->7         started        process3 file4 26 C:\Users\user\AppData\...\gokScrwtSq.exe, PE32 7->26 dropped 28 C:\Users\user\AppData\Local\...\tmpB502.tmp, XML 7->28 dropped 30 C:\Users\user\...\RFQ USD 03142022.exe.log, ASCII 7->30 dropped 42 Adds a directory exclusion to Windows Defender 7->42 11 RFQ USD 03142022.exe 2 7->11         started        14 powershell.exe 24 7->14         started        16 powershell.exe 24 7->16         started        18 schtasks.exe 1 7->18         started        signatures5 process6 dnsIp7 32 norly419.ddns.net 194.5.98.140, 49774, 6969 DANILENKODE Netherlands 11->32 20 conhost.exe 14->20         started        22 conhost.exe 16->22         started        24 conhost.exe 18->24         started        process8
Threat name:
Win32.Trojan.AgenteslaPacker
Status:
Malicious
First seen:
2022-03-14 05:47:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet rat stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
.NET Reactor proctector
NetWire RAT payload
Netwire
Malware Config
C2 Extraction:
norly419.ddns.net:6969
Unpacked files
SH256 hash:
30681519ec2d034fb4b16942c2319c2b86b860a43322ac652d4a386b87692058
MD5 hash:
272487017097679cd7ea5c69fa47e76e
SHA1 hash:
e49f034476f2da22246b862003c815ca9c31d39a
Detections:
win_netwire_g1
SH256 hash:
4002e08a04e293b7225d9555b7eee729178b3bd036a506fb5d6e6cc6a26e80a3
MD5 hash:
1a487e823b6efe87930f9c088ee15469
SHA1 hash:
c3407677e8a16321e93b93c224d7b9e740e7291d
SH256 hash:
9b00e2fa33ad72dec22a5e107ab6886da72bbe0bed89a721e877c1dc3ce6a662
MD5 hash:
b4c9c16228f0ee1de70ffc6264fb720c
SHA1 hash:
437049e452a511e220abdb32df695cdf07f5a7d0
SH256 hash:
ec1c0f0497cf2dae34d30e02d4e67f91d8b2597d738f1490706ed7518d639e20
MD5 hash:
d7b17064e4886c447ed6762d92bec4f6
SHA1 hash:
19540db868f2f5385a61c7051e124f5c1005304e
SH256 hash:
da91ebb2535be02b6cf046e0c03dbfc8e917794a997332d1c0d5cd134a476581
MD5 hash:
8eb0b7aba5e4a91fae4767fb71606709
SHA1 hash:
08d087c9f92a4d23cb9ecb2a02472255eddcbe13
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:MALWARE_Win_NetWire
Author:ditekSHen
Description:Detects NetWire RAT
Rule name:MAL_unspecified_Jan18_1
Author:Florian Roth
Description:Detects unspecified malware sample
Reference:Internal Research
Rule name:MAL_unspecified_Jan18_1_RID2F4A
Author:Florian Roth
Description:Detects unspecified malware sample
Reference:Internal Research
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments