MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 152a43a4f8818ce99bbf403fc7a7f9d0d46478f4363841af971a950f166c271e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 152a43a4f8818ce99bbf403fc7a7f9d0d46478f4363841af971a950f166c271e
SHA3-384 hash: c865619c9b827eacff4f3d00d01613ad9c0f6a7062fe9c4f0d008488dface0f50610675b97762532ef719dc96d933f1f
SHA1 hash: 13b8cd6d28268607ea1a2681d90a1a5688e05f7f
MD5 hash: f0b0e76964c981c12e641242d759c08c
humanhash: shade-batman-tennis-glucose
File name:SecuriteInfo.com.Generic.mg.f0b0e76964c981c1.7259
Download: download sample
Signature NanoCore
File size:24'584 bytes
First seen:2020-12-15 09:47:11 UTC
Last seen:2020-12-15 14:23:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 384:39axJ9i243cPeKd1HyQ51b4Tl+wNAtzhCO94RnEnDgf2hV:3UxJc2fBb4Tl+NtVbuEUf2hV
Threatray 4 similar samples on MalwareBazaar
TLSH EDB21B561308FF12F5978B303603E1637B20927A776B8BA6F065474CDA426D426DDEC7
Reporter SecuriteInfoCom
Tags:NanoCore

Intelligence


File Origin
# of uploads :
3
# of downloads :
161
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ.doc
Verdict:
Malicious activity
Analysis date:
2020-12-15 07:19:39 UTC
Tags:
exploit CVE-2017-11882 loader rat nanocore

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Sending a TCP request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Connects to a pastebin service (likely for C&C)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 330589 Sample: SecuriteInfo.com.Generic.mg... Startdate: 15/12/2020 Architecture: WINDOWS Score: 52 20 Multi AV Scanner detection for submitted file 2->20 22 Connects to a pastebin service (likely for C&C) 2->22 7 SecuriteInfo.com.Generic.mg.f0b0e76964c981c1.exe 15 3 2->7         started        process3 dnsIp4 18 hastebin.com 172.67.143.180, 443, 49720 CLOUDFLARENETUS United States 7->18 10 cmd.exe 1 7->10         started        12 WerFault.exe 23 9 7->12         started        process5 process6 14 conhost.exe 10->14         started        16 timeout.exe 1 10->16         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-15 08:04:33 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
152a43a4f8818ce99bbf403fc7a7f9d0d46478f4363841af971a950f166c271e
MD5 hash:
f0b0e76964c981c12e641242d759c08c
SHA1 hash:
13b8cd6d28268607ea1a2681d90a1a5688e05f7f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe 152a43a4f8818ce99bbf403fc7a7f9d0d46478f4363841af971a950f166c271e

(this sample)

  
Delivery method
Distributed via web download

Comments