MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e583f88a5a2f0078444fa97cfd8b4357bce832202ec6140ade6239e7687c1850. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 1 File information 3 Yara 5 Comments

SHA256 hash: e583f88a5a2f0078444fa97cfd8b4357bce832202ec6140ade6239e7687c1850
SHA3-384 hash: 72c66d5df8bd8445785a1d2063f3f64324407aaba833d6c363a9afbbc9a1495c59870b3229c90c4567626c28f23d5cf7
SHA1 hash: 34c52204bf26caf614b3b0177b2cf6b3f1e1be25
MD5 hash: b6fb3e01b32130297ac61b8c33f3bdde
humanhash: bluebird-romeo-pizza-emma
File name:b6fb3e01b32130297ac61b8c33f3bdde.exe
Download: download sample
Signature NanoCore
File size:317'952 bytes
First seen:2020-06-30 06:36:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:uDts6hsQf4+dPZ06n53tx7TzCs4XyQYCV8:N6+B+oy59Vz0XyQLV8
TLSH 30640204ABC8E942D97F0675C0E797F45391CDA76502D31F14CABE9F3823BCA1A0A49B
Reporter @abuse_ch
Tags:exe NanoCore nVpn RAT


Twitter
@abuse_ch
NanoCore RAT C2:
gold1.dnsupdate.info:4777 (79.134.225.84)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


Mail intelligence No data
# of uploads 1
# of downloads 25
Origin country US US
CAPE Sandbox Detection:NanoCore
Link: https://www.capesandbox.com/analysis/16830/
ClamAV SecuriteInfo.com.Trojan.PackedNET.276.11354.28167.UNOFFICIAL
CERT.PL MWDB Detection:nanocore
Link: https://mwdb.cert.pl/sample/e583f88a5a2f0078444fa97cfd8b4357bce832202ec6140ade6239e7687c1850/
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Wacatac
First seen:2020-06-30 00:14:25 UTC
AV detection:23 of 31 (74.19%)
Threat level:   2/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:nanocore
Link: https://tria.ge/reports/200630-rmh2qgkebn/
Tags:evasion trojan keylogger stealer spyware family:nanocore
Config extraction:gold1.dnsupdate.info:4777
gold080.ooguy.com:4777
VirusTotal:Virustotal results 36.99%

Yara Signatures


Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe e583f88a5a2f0078444fa97cfd8b4357bce832202ec6140ade6239e7687c1850

(this sample)

  
Delivery method
Distributed via web download

Comments