Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
49
Global rank
77 infographic chevron month
Month rank
58 infographic chevron week
Week rank
0
IOCs

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Trojan
Type
ex-USSR territory
Origin
1 January, 2012
First seen
23 November, 2025
Last seen
Also known as
Recam

How to analyze Netwire with ANY.RUN

Type
ex-USSR territory
Origin
1 January, 2012
First seen
23 November, 2025
Last seen

IOCs

IP addresses
213.152.161.35
185.81.157.169
212.193.30.230
37.233.101.73
154.16.93.178
173.254.223.117
213.152.162.104
213.152.162.170
213.152.162.109
178.32.72.136
193.124.0.151
103.53.199.247
184.75.221.171
213.152.162.89
109.232.227.138
213.152.162.181
194.5.98.126
194.5.98.65
213.152.162.94
213.183.58.34
Hashes
ce46763b5ddcf44b645e4cfada58b6f7c583b0a6972d53d7e38859943726f771
08ab33410d3084729af2ff137aa173d028e37db6f0a23632661f5e1213cc3d46
2fb99628bd39d9926c02b23c06969ff97f8f9155c60c66fba7bafc2c4a3cc14a
e0751f7c2c4fab592a64ac210e1a5ac5ed4460cd0252c8bbc2aa70e7875ff0be
1b0cd29f5fb379f720d4d4c7a2a12002a4e1e0ebf255c90a5efa92635b6072ae
43a124b93b9364ed685d7a165eda2de9588f29914e381ea83c33be7b0c4925d4
36a15c5344fc33f7d3f7d587aa1f5a968a7bc86f0a2e5302ca1fa73bf8549360
a7b1971fba2701c6d237fc20f2635c76fe9c7c5f94fe0cd84b200abbd04248cd
b58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e
07080ddc9f47e8c7f275e7153c2b0c7d7ca2431740ce1023e34ab0ee960f0afc
3e44e780a76526026a6ddbcea40043e5fd098bf107b0b68f7d9d232eb72ae574
c9ec52ae2ddb993e2da0efd4fbab0bfecdc7cc6da16e446ac9c92e7981733e6e
3a65c34547eb0321e3cf4658917342f8f5677cfe11d4781ef72a2b508bf7da6c
855091d1eed98e9686e595ba254a43082fa99f16cdc33cf51e63088a43869c3d
4a1733659dd3f0df847caabfc88bd9a390016e4b88ff404bc7be634dfaf8c0b0
7555ae0827fb6df6e3a9e1df7a5e4ff5cf290d11547c8764feb944c39765fab3
109d55d898a80a41b074044158f159919d1d242642a29080d866ca92f10726d9
7511c244b32ec5bc59ff7173ee5aa83a764ea6607522b79cc99c5537907e50e7
ea28c9696d640ec42546593eeb57c11aeb01a41bd62bddda882c5841dcd950dc
32c2847e6ef4a25a580bd78bb1d0d113aaa36dc53ec28bf5c86ba959c60ddf5a
Domains
iphy2.linkpc.net
iphy.strangled.net
xman2.duckdns.org
musaad1995-60255.portmap.host
ast3rhost.ddns.net
iphanyi.edns.biz
reportss.duckdns.org
chrisle79.ddns.net
whatis79.ddns.net
b7r.duckdns.org
jacknop79.ddns.net
smath79.ddns.net
goodgt79.ddns.net
bonding79.ddns.net
chongmei33.myddns.rocks
alisteelhousee.ddns.net
blackhills.ddns.net
extensions14718.sytes.net
newmone.ddns.net
william1979.ddns.net
Last Seen at

Recent blog posts

post image
Detected in 60 Seconds: How to Identify Phish...
watchers 547
comments 0
post image
LOLBin Attacks Explained with Examples: Every...
watchers 2612
comments 0
post image
Healthcare MSSP Cuts Phishing Triage by 76% a...
watchers 527
comments 0

What is Netwire RAT?

Netwire is a remote access trojan-type malware. A RAT is malware used to control an infected machine remotely. This particular RAT can perform over 100 malicious actions on infected machines and can attack multiple systems, including Windows, Apple’s MacOS, and Linux.

Netwire malware is available for purchase on the darknet in the underground hacking communities, where attackers can buy this RAT for the price of 40 to 140 USD. In addition, Netwire can be purchased on the surface internet for a price of 180 USD. Notably, in 2016 Netwire received an update that added the functionality to steal data from devices connected to the infected machine, such as USB credit card readers, allowing Netwire to perform POS attacks.

General description of Netwire RAT

Netwire Trojan core functionality allows this malware to take remote control of infected PCs, record keyboard strokes and mouse behavior, take screenshots, check system information, and create fake HTTP proxies.

The keylogger functionally allows Netwire to record various personal data imputed on a computer connected to the internet or a corporate network. Combined with the ability to steal credit card information and operate undetected for extended periods of time, Netwire RAT is truly capable of inflicting serious dangers to organizations.

In some malicious campaigns, the Netwire trojan was used to target healthcare and banking businesses. The malware was also documented as being used by a group of scammers from Africa who utilized Netwire to take remote control of infected machines.

Netwire RAT creators have put in a lot of work to ensure that researchers have a hard time analyzing this malware, as many precautions are taken to complicate the research process, including techniques like multiple data encryption layers and string obfuscation. In addition, the malware uses a custom C2 binary protocol that is also encrypted, and so is the relevant data before transmission.

During one campaign, researchers have observed Netwire being distributed as “TeamViewer 10” – named so in an effort to trick victims into thinking that they have downloaded the legitimate remote assistance software. Once the execution process began, this version would drop an .EXE file and start establishing persistence right away. The malware created a Windows shortcut in the Startup menu to ensure that the Netwire trojan would always run when the user logged into the system. Interestingly, another trick designed to keep the malware hidden actually gave it away during this particular campaign. The malware would inject its code into the Notepad.exe, unveiling its presence since it’s not normal for the notepad to have an always active network connection. Only after decoding the data prepared for transmission to the C2, the sensitive nature of the stolen information was discovered. Unfortunately, researches did not reveal what the organization was targeted in this particular attack.

Netwire RAT malware analysis

A video simulation recorded on ANY.RUN enables researchers to study the lifecycle of the Netwire in a lot of detail and works like a tutorial.

process graph of the Netwire execution Figure 1: Process graph generated by ANY.RUN allows visualizing the life cycle of Netwire

a text report of a netwire analysis Figure 2: A text report generated by ANY.RUN is a great tool to share the research results

Netwire RAT execution process

Netwire isn't as exciting as some other malicious programs can be as far as malware execution goes. It makes its way into the device, mostly in the form of a payload.

The user receives a spam email with an attached Microsoft Word file. After the user downloads and opens this file, the executable is dropped or downloaded onto the machine. After that, the executable starts performing the main malicious activity such as writing itself in autorun, connecting to C2 servers, and stealing information from an infected device. Netwire also has the ability to inject into unsuspicious processes from which it can perform malicious activities.

Distribution of Netwire RAT

Netwire RAT is usually being distributed in email phishing campaigns in the form of a malicious Microsoft Office document. The victim must enable macros for the RAT to enter an active state. The macros then proceed to download Netwire, allowing the malware to start the execution process.

How to export Netwire data using ANY.RUN?

If analysts want to do additional work with events from tasks or share them with colleagues for tutorials, they can export to different formats. Just click on the "Export" button and choose the most suitable format in the drop-down menu. Export of any kind of malware research is available including Predator the Thief or Qbot.

Export options for netwire malware Figure 3: Export options for netwire malware

Conclusion

Diverse information stealing feature sets combined with the ability to target multiple operating systems and steal data from credit cards used in an infected system make Netwire Trojan a highly dangerous remote access trojan.

Despite its impressive functionality, the malware is fairly accessible, “retailing” on underground forums for as little as 40 dollars in some select cases. The situation is further worsened by the fact that creators of Netwire RAT have implemented several features designed to complicate the analysis as much as possible.

However, researchers can take advantage of interactive malware hunting services, such as ANY.RUN, which allows to influence the simulation at any point and get much purer research results.

HAVE A LOOK AT

MetaStealer screenshot
MetaStealer
metastealer
MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
CryptoWall screenshot
CryptoWall
cryptowall
CryptoWall is a notorious ransomware family that emerged in early 2014 and rapidly became one of the most destructive cyber threats of its time. This malware encrypts victims' files using strong AES encryption, demands ransom payments in Bitcoin, and has generated hundreds of millions of dollars for cybercriminals.
Read More
Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More
Crocodilus screenshot
Crocodilus
crocodilus
Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.
Read More
Lynx screenshot
Lynx
lynx
Lynx is a double extortion ransomware: attackers encrypt important and sensitive data and demand a ransom for decryption simultaneously threatening to publish or sell the data. Active since mid-2024. Among techniques are terminating processes and services, privilege escalation, deleting shadow copies. Distribution by phishing, malvertising, exploiting vulnerabilities.
Read More