MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 130cf972bf44124d373d75675db814b23b0a50a9c0ffcff4c2171a06e76fc015. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nitol


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments 1

SHA256 hash: 130cf972bf44124d373d75675db814b23b0a50a9c0ffcff4c2171a06e76fc015
SHA3-384 hash: e1429e616d93a0091bf97b97ba9cd50837a08a9c3bb02c742823b040e63459342b4f1ac741cd9ab1cf426d9248b93c2c
SHA1 hash: 070597ee9b9738eb43fe81943aa238cfafab280b
MD5 hash: aababae73215c149656ca2bd7223788e
humanhash: december-hawaii-social-mountain
File name:aababae73215c149656ca2bd7223788e
Download: download sample
Signature Nitol
File size:118'784 bytes
First seen:2022-01-23 18:09:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8386d7aeb63b64464131b2b99c8a6dcf (1 x Nitol)
ssdeep 3072:TGq/NKEGDwQcMUYrXNYO2Z64n57wjzqZH:QwQ7H2YG57wjzqZ
Threatray 1'981 similar samples on MalwareBazaar
TLSH T1B7C3AECCD5A26917EE00FAF32C69DABE76D694138934149E0509C5DD1813B38AEFCE63
Reporter zbetcheckin
Tags:32 exe Nitol

Intelligence


File Origin
# of uploads :
1
# of downloads :
294
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aababae73215c149656ca2bd7223788e
Verdict:
Suspicious activity
Analysis date:
2022-01-23 18:15:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Enabling the 'hidden' option for recently created files
Creating a service
Launching a service
Creating a process from a recently created file
Searching for synchronization primitives
Running batch commands
Creating a process with a hidden window
Sending a custom TCP request
DNS request
Creating a file in the Windows subdirectories
Possible injection to a system process
Enabling autorun for a service
Launching a file downloaded from the Internet
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
keylogger
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Changes security center settings (notifications, updates, antivirus, firewall)
Deletes itself after installation
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Change PowerShell Policies to a Unsecure Level
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Yara detected Nitol
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 558379 Sample: 8AyH2CgnMK Startdate: 23/01/2022 Architecture: WINDOWS Score: 100 49 Antivirus detection for dropped file 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 53 Sigma detected: Powershell download and execute file 2->53 55 9 other signatures 2->55 8 8AyH2CgnMK.exe 2 3 2->8         started        12 Dog.exe 2->12         started        14 svchost.exe 2->14         started        16 10 other processes 2->16 process3 dnsIp4 39 C:\Program Files (x86)\Dog.exe, PE32 8->39 dropped 41 C:\...\Dog.exe:Zone.Identifier, ASCII 8->41 dropped 63 Deletes itself after installation 8->63 19 cmd.exe 1 8->19         started        22 Dog.exe 1 12->22         started        65 Changes security center settings (notifications, updates, antivirus, firewall) 14->65 25 MpCmdRun.exe 1 14->25         started        43 192.168.2.1 unknown unknown 16->43 file5 signatures6 process7 dnsIp8 57 Suspicious powershell command line found 19->57 59 Tries to download and execute files (via powershell) 19->59 61 Bypasses PowerShell execution policy 19->61 27 conhost.exe 19->27         started        47 209.141.58.111, 49755, 8000 PONYNETUS United States 22->47 29 cmd.exe 1 22->29         started        32 conhost.exe 25->32         started        signatures9 process10 signatures11 67 Suspicious powershell command line found 29->67 69 Tries to download and execute files (via powershell) 29->69 34 powershell.exe 17 25 29->34         started        37 conhost.exe 29->37         started        process12 dnsIp13 45 haohm.502ok.com 34->45
Threat name:
Win32.Backdoor.Zegost
Status:
Malicious
First seen:
2022-01-23 18:10:11 UTC
File Type:
PE (Exe)
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Enumerates connected drives
Deletes itself
Executes dropped EXE
Malware Config
Dropper Extraction:
http://haohm.502ok.com/hm
Unpacked files
SH256 hash:
479baf43c7c2333d8dc01d11aa1542181cdb4663cd0b1d18683ee0e5bae87443
MD5 hash:
e707fef59d78f2eb228bf785d58f592a
SHA1 hash:
3c9b75750a48be41d4b27026e5fc2a8b9af80e3c
Detections:
win_younglotus_auto
SH256 hash:
747983267e6a30273354062b6dadeec1fe9445aef06e87812971238b795ffa24
MD5 hash:
e07e4c9b2a32ed198685ff2975af2f4d
SHA1 hash:
8c94eceef1dec854d760b61a312a6b58d4cf006e
SH256 hash:
130cf972bf44124d373d75675db814b23b0a50a9c0ffcff4c2171a06e76fc015
MD5 hash:
aababae73215c149656ca2bd7223788e
SHA1 hash:
070597ee9b9738eb43fe81943aa238cfafab280b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Nitol
Author:ditekSHen
Description:Detects Nitol backdoor
Rule name:win_younglotus_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.younglotus.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Nitol

Executable exe 130cf972bf44124d373d75675db814b23b0a50a9c0ffcff4c2171a06e76fc015

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-23 18:09:25 UTC

url : hxxp://209.141.58.111:8080/gwupdater.exe