Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
40
Global rank
17 infographic chevron month
Month rank
11
Week rank
0
IOCs

Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.

Trojan
Type
ex-USSR territory
Origin
1 January, 2012
First seen
9 January, 2026
Last seen
Also known as
Recam

How to analyze Netwire with ANY.RUN

Type
ex-USSR territory
Origin
1 January, 2012
First seen
9 January, 2026
Last seen

IOCs

IP addresses
37.233.101.73
154.16.93.178
173.254.223.117
213.152.162.104
213.152.162.170
213.152.162.109
178.32.72.136
193.124.0.151
103.53.199.247
213.152.161.35
184.75.221.171
213.152.162.89
109.232.227.138
213.152.162.181
194.5.98.126
194.5.98.65
213.152.162.94
213.183.58.34
194.5.98.122
79.134.225.121
Hashes
e3edba9f4ae246a43360369856788767104a0ecd46cc016c71ca2bbdf515b523
e0751f7c2c4fab592a64ac210e1a5ac5ed4460cd0252c8bbc2aa70e7875ff0be
1b0cd29f5fb379f720d4d4c7a2a12002a4e1e0ebf255c90a5efa92635b6072ae
3aefa2f9a68bd3990a9673cf7a034ed3d88053558ad71b0f36a7929d973579a5
53602a3af454a7a1199d292b2beb6ba3a77f819b4fe87d4f2848e29a103c18d7
486c4dfab1336be295774b71b9510d55a34a604f4af4e6ba5d17295425b14de6
288719cc7ce53a7dc829be4a5d261e0c9229aca9097b72bea018fa7c9aa84000
2a05a23d8879f9d001af335779b5102dd644b08d2f106353c28c8ce303ee9b58
43f12717188420f2f146f2532fb245ab7b00d099bd26b6301f7f8cd0a71ef6f7
c9ec52ae2ddb993e2da0efd4fbab0bfecdc7cc6da16e446ac9c92e7981733e6e
6fd358dc3877d50fbaa42283b91ee1ab39d1f8d5a9cc951e9d0fd86497460104
3a65c34547eb0321e3cf4658917342f8f5677cfe11d4781ef72a2b508bf7da6c
e7471adb3c355b9ab579a89845f94f23d3571acf201b6668a511ae23024f436f
e5f4b0f7fca76e5b5764504e5712c3df5fe5711f90960bc6a856d27202be4ef2
efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646
f54b2f764ed7112c3a11adf056a54b8646f23093fbc52ce0e07a184f5dd69fcc
4a1733659dd3f0df847caabfc88bd9a390016e4b88ff404bc7be634dfaf8c0b0
7511c244b32ec5bc59ff7173ee5aa83a764ea6607522b79cc99c5537907e50e7
5540d3256d4e24a41945ff8d40078deb2d5531242639d718b122f3044d52420d
decc177965c50045ab50a35242471d1dda3e7fa06c84ba84099c372079ba76ab
Domains
alisteelhousee.ddns.net
blackhills.ddns.net
extensions14718.sytes.net
newmone.ddns.net
william1979.ddns.net
clients.enigmasolutions.xyz
manuel3.publicvm.com
wcbradley.duckdns.org
iheuche009.hopto.org
fingers1.ddns.net
1brainfix.ddns.net
popupcalls.ddns.net
sosclient.duckdns.org
blazeblaze.ddns.net
mathkros79.ddns.net
playhardgopro.life
asorock0011.ddns.net
engine79.ddns.net
info1.nowddns.com
ghost4senator.duckdns.org
Last Seen at

Recent blog posts

post image
Integrating a Malware Sandbox into SOAR Workf...
watchers 653
comments 0
post image
5 Ways MSSPs Can Win Clients in 2026
watchers 559
comments 0
post image
Release Notes: AI Sigma Rules, Live Threat La...
watchers 1103
comments 0

What is Netwire RAT?

Netwire is a remote access trojan-type malware. A RAT is malware used to control an infected machine remotely. This particular RAT can perform over 100 malicious actions on infected machines and can attack multiple systems, including Windows, Apple’s MacOS, and Linux.

Netwire malware is available for purchase on the darknet in the underground hacking communities, where attackers can buy this RAT for the price of 40 to 140 USD. In addition, Netwire can be purchased on the surface internet for a price of 180 USD. Notably, in 2016 Netwire received an update that added the functionality to steal data from devices connected to the infected machine, such as USB credit card readers, allowing Netwire to perform POS attacks.

General description of Netwire RAT

Netwire Trojan core functionality allows this malware to take remote control of infected PCs, record keyboard strokes and mouse behavior, take screenshots, check system information, and create fake HTTP proxies.

The keylogger functionally allows Netwire to record various personal data imputed on a computer connected to the internet or a corporate network. Combined with the ability to steal credit card information and operate undetected for extended periods of time, Netwire RAT is truly capable of inflicting serious dangers to organizations.

In some malicious campaigns, the Netwire trojan was used to target healthcare and banking businesses. The malware was also documented as being used by a group of scammers from Africa who utilized Netwire to take remote control of infected machines.

Netwire RAT creators have put in a lot of work to ensure that researchers have a hard time analyzing this malware, as many precautions are taken to complicate the research process, including techniques like multiple data encryption layers and string obfuscation. In addition, the malware uses a custom C2 binary protocol that is also encrypted, and so is the relevant data before transmission.

During one campaign, researchers have observed Netwire being distributed as “TeamViewer 10” – named so in an effort to trick victims into thinking that they have downloaded the legitimate remote assistance software. Once the execution process began, this version would drop an .EXE file and start establishing persistence right away. The malware created a Windows shortcut in the Startup menu to ensure that the Netwire trojan would always run when the user logged into the system. Interestingly, another trick designed to keep the malware hidden actually gave it away during this particular campaign. The malware would inject its code into the Notepad.exe, unveiling its presence since it’s not normal for the notepad to have an always active network connection. Only after decoding the data prepared for transmission to the C2, the sensitive nature of the stolen information was discovered. Unfortunately, researches did not reveal what the organization was targeted in this particular attack.

Netwire RAT malware analysis

A video simulation recorded on ANY.RUN enables researchers to study the lifecycle of the Netwire in a lot of detail and works like a tutorial.

process graph of the Netwire execution Figure 1: Process graph generated by ANY.RUN allows visualizing the life cycle of Netwire

a text report of a netwire analysis Figure 2: A text report generated by ANY.RUN is a great tool to share the research results

Netwire RAT execution process

Netwire isn't as exciting as some other malicious programs can be as far as malware execution goes. It makes its way into the device, mostly in the form of a payload.

The user receives a spam email with an attached Microsoft Word file. After the user downloads and opens this file, the executable is dropped or downloaded onto the machine. After that, the executable starts performing the main malicious activity such as writing itself in autorun, connecting to C2 servers, and stealing information from an infected device. Netwire also has the ability to inject into unsuspicious processes from which it can perform malicious activities.

Distribution of Netwire RAT

Netwire RAT is usually being distributed in email phishing campaigns in the form of a malicious Microsoft Office document. The victim must enable macros for the RAT to enter an active state. The macros then proceed to download Netwire, allowing the malware to start the execution process.

How to export Netwire data using ANY.RUN?

If analysts want to do additional work with events from tasks or share them with colleagues for tutorials, they can export to different formats. Just click on the "Export" button and choose the most suitable format in the drop-down menu. Export of any kind of malware research is available including Predator the Thief or Qbot.

Export options for netwire malware Figure 3: Export options for netwire malware

Conclusion

Diverse information stealing feature sets combined with the ability to target multiple operating systems and steal data from credit cards used in an infected system make Netwire Trojan a highly dangerous remote access trojan.

Despite its impressive functionality, the malware is fairly accessible, “retailing” on underground forums for as little as 40 dollars in some select cases. The situation is further worsened by the fact that creators of Netwire RAT have implemented several features designed to complicate the analysis as much as possible.

However, researchers can take advantage of interactive malware hunting services, such as ANY.RUN, which allows to influence the simulation at any point and get much purer research results.

HAVE A LOOK AT

Maze screenshot
Maze
maze ransomware
Maze is ransomware — a malware type that encrypts the victim’s files and restores the data in exchange for a ransom payment. One of the most distinguishable features of Maze is that it is one of the first malware of the kind to publicly release stolen data.
Read More
RedLine screenshot
RedLine
redline stealer redline stealer malware
RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
Read More
LokiBot screenshot
LokiBot
lokibot loader trojan
LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.
Read More
Prometei screenshot
Prometei
prometei
Prometei is a modular botnet malware family that silently infiltrates systems, hijacking their resources for illicit Monero (XMR) mining. Active since at least 2016, it combines stealth, persistence, and lateral movement capabilities. Notable for its global reach and opportunistic infection strategy, it is also used for credential theft.
Read More
zgRAT screenshot
zgRAT
zgrat
zgRAT is a malware known for its ability to infect systems and exfiltrate sensitive data to command-and-control (C2) servers. It is primarily distributed through loader malware, as well as phishing emails. zgRAT employs various advanced techniques, including process injection and code obfuscation, to evade detection and maintain persistence on infected systems. The malware can also spread via USB drives and uses popular messaging platforms like Telegram and Discord for data exfiltration.
Read More
WarmCookie screenshot
WarmCookie
badspace
WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.
Read More