MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dbafada7e8406895de0d99952e4543a123b453c9181e4b9244c8938e3cbc9d6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: dbafada7e8406895de0d99952e4543a123b453c9181e4b9244c8938e3cbc9d6d
SHA3-384 hash: 809d24ddc67f3213072d85d7446f6a7847d1eba402e580a0258df9f13e04c0f79433e90e0592c32b6b7f94b15bb13495
SHA1 hash: 694a52adcd917ece99e03b46459d9dbcd1d89dd3
MD5 hash: 9a6ab94484d3987d7ffc49d24b3b5783
humanhash: comet-green-spring-triple
File name:Kojcujmcpvqazbuwcyhwoekmlsfsochnsl.exe
Download: download sample
Signature NetWire
File size:849'920 bytes
First seen:2021-10-04 06:55:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8276363bcf2f383c8cd04fac30801161 (10 x RemcosRAT, 2 x NetWire, 1 x Formbook)
ssdeep 12288:0w6jlNSq3W9F1Sa+tiDWIyNCYAycjL7YiEFXXXB:Naeq3gF1Sf+WIy9AyAdSXXXB
Threatray 1'262 similar samples on MalwareBazaar
TLSH T1840506224144A72AF11A3336E98B111417E2AD3C2E604B3AF5955B4B4F3F784EED687F
File icon (PE):PE icon
dhash icon 1432694969516806 (10 x RemcosRAT, 2 x NetWire, 1 x Formbook)
Reporter abuse_ch
Tags:exe NetWire RAT


Avatar
abuse_ch
NetWire C2:
104.254.90.235:5457

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
104.254.90.235:5457 https://threatfox.abuse.ch/ioc/230078/

Intelligence


File Origin
# of uploads :
1
# of downloads :
459
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Kojcujmcpvqazbuwcyhwoekmlsfsochnsl.exe
Verdict:
Malicious activity
Analysis date:
2021-10-04 06:57:06 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger packed
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 496107 Sample: Kojcujmcpvqazbuwcyhwoekmlsf... Startdate: 04/10/2021 Architecture: WINDOWS Score: 100 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Yara detected NetWire RAT 2->67 69 C2 URLs / IPs found in malware configuration 2->69 8 Kojcujmcpvqazbuwcyhwoekmlsfsochnsl.exe 1 22 2->8         started        13 Kojcujm.exe 15 2->13         started        15 Kojcujm.exe 15 2->15         started        process3 dnsIp4 49 vmps3w.sn.files.1drv.com 8->49 57 2 other IPs or domains 8->57 41 C:\Users\Public\Libraries\...\Kojcujm.exe, PE32 8->41 dropped 77 Writes to foreign memory regions 8->77 79 Creates a thread in another existing process (thread injection) 8->79 81 Injects a PE file into a foreign processes 8->81 17 logagent.exe 2 8->17         started        21 cmd.exe 1 8->21         started        23 cmd.exe 1 8->23         started        51 vmps3w.sn.files.1drv.com 13->51 59 2 other IPs or domains 13->59 83 Multi AV Scanner detection for dropped file 13->83 85 Allocates memory in foreign processes 13->85 25 logagent.exe 13->25         started        53 192.168.2.1 unknown unknown 15->53 55 vmps3w.sn.files.1drv.com 15->55 61 2 other IPs or domains 15->61 27 DpiScaling.exe 15->27         started        file5 signatures6 process7 dnsIp8 43 185.103.96.143, 49828, 5457 UKSERVERS-ASUKDedicatedServersHostingandCo-Location United Kingdom 17->43 45 91.214.169.69, 5457 LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHolding Switzerland 17->45 47 3 other IPs or domains 17->47 71 Contains functionality to log keystrokes 17->71 73 Contains functionality to steal Internet Explorer form passwords 17->73 75 Contains functionality to steal Chrome passwords or cookies 17->75 29 reg.exe 1 21->29         started        31 conhost.exe 21->31         started        33 cmd.exe 1 23->33         started        35 conhost.exe 23->35         started        signatures9 process10 process11 37 conhost.exe 29->37         started        39 conhost.exe 33->39         started       
Result
Malware family:
netwire
Score:
  10/10
Tags:
family:netwire botnet persistence rat stealer
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
NetWire RAT payload
Netwire
Malware Config
C2 Extraction:
64.42.179.51:5457
185.103.96.143:5457
91.214.169.69:5457
213.152.161.239:5457
104.254.90.235:5457
Unpacked files
SH256 hash:
8355a1e5aee67b2e140b6e38bf507d23470f1e223bc3e61e124313a14ebcfb59
MD5 hash:
4e1e2029a6257910978aed9bf3b6988f
SHA1 hash:
f4eb74facae591787fb7e254aa544e2fd93f2ce4
SH256 hash:
f808a11e5b1cb4332bb4d65cdbcf1e0ca7323b15bcf73cb7462ad3eb30f05703
MD5 hash:
6cfdeebc3c72279486ddd229eb14b009
SHA1 hash:
e3a2a0a2a0fabd55415c9007f52c79fe9e19e0a7
SH256 hash:
dbafada7e8406895de0d99952e4543a123b453c9181e4b9244c8938e3cbc9d6d
MD5 hash:
9a6ab94484d3987d7ffc49d24b3b5783
SHA1 hash:
694a52adcd917ece99e03b46459d9dbcd1d89dd3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments