MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dfe18346db405af2484064e80b5c0124bc80ca84d39b90e1aa5d5592c479a904. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: dfe18346db405af2484064e80b5c0124bc80ca84d39b90e1aa5d5592c479a904
SHA3-384 hash: 89f3111af4b675c3c607ac38ef8461a3f101aa28a180e1c21ffbf6d5767eaef33dadc8d1675ed6f332fb74958d0bd125
SHA1 hash: 734807ef7b402219ab1badb5d5c1804639a465f9
MD5 hash: 809ff867d2cfe803ef4ae4102283b45c
humanhash: six-winner-football-cardinal
File name:MicroScMgmt.bin
Download: download sample
Signature NetWire
File size:106'552 bytes
First seen:2020-07-06 07:41:14 UTC
Last seen:2020-08-29 08:17:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 75b883fc692473a6eb7f309e3f1a432d (1 x NetWire)
ssdeep 1536:F8hbftGz+wdIvO9c2tCTbol9xWH/sGqu38sIXQ+l3molT/sYs2z2kfesZ3Q+w3OS:Focx/c2ETbOGs7ucQa3ZisdQ+w3+Mmlg
Threatray 90 similar samples on MalwareBazaar
TLSH E5A3AE4BFA4FE5F1E657553080E7EA3B4539A831C03BED67FF4A8B68A8325415C1821A
Reporter JAMESWT_WT
Tags:NetWire

Code Signing Certificate

Organisation:Accelerate Technologies Ltd
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Mar 7 00:00:00 2020 GMT
Valid to:Mar 4 23:59:59 2021 GMT
Serial number: B3F906E5E6B2CF61C5E51BE79B4E8777
Intelligence: 35 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2B48363D587B11F2726D343E0ED1D76A2E4ADBC4A383C30CDAE41ADE0006B224
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
4
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-07-05 00:59:00 UTC
File Type:
PE (Exe)
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments