MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7e2340164fd0b2b400526f352420dc16a71df2861079d1ab4965e6f78b3257a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c7e2340164fd0b2b400526f352420dc16a71df2861079d1ab4965e6f78b3257a
SHA3-384 hash: 47d98895e0995ef96db5f42740d985fd05a8a718fab0c2580b43405f103acdb38023e6881154e9f74edbd9c13ef18f6d
SHA1 hash: 58f2d37efc405ad4390eb3ad87e822f55a909d49
MD5 hash: c0fd06cc7af59e5b3e7a409cdb8e0982
humanhash: oven-four-august-may
File name:DHL Delayed Parcel Print Receipt.r11
Download: download sample
Signature NanoCore
File size:352'119 bytes
First seen:2020-05-06 08:07:33 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:C19VaHLqkn0JZeic1RAXtDxwi9m5cIlJ/mJqqoUZiCMMvesAheYbTi4xNvJb1Kns:C16Lqk0JEd1YRxwBVl6qbU4CMkebZTXh
TLSH 887423791862350D6AE03108E3B799225570ADF3DAEA7BFDD8335CD4BE172588E433A4
Reporter abuse_ch
Tags:COVID-19 DHL NanoCore nVpn r11 RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: vps.dpcitqlia.com
Sending IP: 45.95.169.77
From: DHL Customer Support <noreply@dhl.com>
Subject: (COVID-19) DHL Delayed Parcel No: 206-4882-571 Printed Receipt.
Attachment: DHL Delayed Parcel Print Receipt.r11 (contains "DHL Delayed Parcel Print Receipt.exe")

NanoCore RAT C2:
79.134.225.94:9124

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE


Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Malrep
Status:
Malicious
First seen:
2020-05-06 08:35:49 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
22 of 31 (70.97%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

rar c7e2340164fd0b2b400526f352420dc16a71df2861079d1ab4965e6f78b3257a

(this sample)

  
Dropping
NanoCore
  
Delivery method
Distributed via e-mail attachment

Comments