MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e216062353c8bafbbed3e1fa3cd7d154aae43eec2011234f4e20ceb578237f69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetWire


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e216062353c8bafbbed3e1fa3cd7d154aae43eec2011234f4e20ceb578237f69
SHA3-384 hash: 7071bad0ed1034cf5ab55a2064510e8267f7e1201a59e55ffa7dceaef86708e86ed89d8213ef297d087fac834fa1042e
SHA1 hash: 3419b9f1092d87c83eb9614e2812923cb742519a
MD5 hash: d993a407fdf84f56fa3d30a084bbc097
humanhash: asparagus-blue-september-hamper
File name:e216062353c8bafbbed3e1fa3cd7d154aae43eec2011234f4e20ceb578237f69
Download: download sample
Signature NetWire
File size:638'640 bytes
First seen:2020-07-06 06:44:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fc6683d30d9f25244a50fd5357825e79 (92 x Formbook, 52 x AgentTesla, 23 x SnakeKeylogger)
ssdeep 12288:cquErHF6xC9D6DmR1J98w4oknqO2CyQfFCQQ5a76+ryxqpFo2nuNaewl/b4qtA:trl6kD68JmloLQfkI76++YpdnuYeMD4R
Threatray 1'701 similar samples on MalwareBazaar
TLSH CCD401437A97A10EDCEE46710C6598E40965FD211C38CAFBF690F73E6A31610EDA532E
Reporter JAMESWT_WT
Tags:NetWire

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
DNS request
Enabling autorun
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2020-06-30 19:13:00 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
30 of 31 (96.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments