MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1622bdde61030fe3f302c9bdc6f3d8a9fcee9dedae943c9fbc039cbe365990d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 13
| SHA256 hash: | 1622bdde61030fe3f302c9bdc6f3d8a9fcee9dedae943c9fbc039cbe365990d6 |
|---|---|
| SHA3-384 hash: | 09cd7ff3c9d829f5cbcb6b91679a45b1157808d0067f08a05c52d2eb251513dec6bb4718257ff25d7bd53bf0901fe795 |
| SHA1 hash: | 10a56945cc5a5a1ec8b27add1bc7a466d3fd2871 |
| MD5 hash: | 17118d9f733afcd33cd58f3ee053a1ff |
| humanhash: | tango-september-xray-purple |
| File name: | SecuriteInfo.com.Trojan.MSIL.Krypt.2239 |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 1'022'464 bytes |
| First seen: | 2022-09-11 07:48:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 24576:07usfe3YIZXj1bpjnZtc3jlK5keEjrAc1l+16P:3t3nXjTHUjgkr4c1jP |
| Threatray | 4'644 similar samples on MalwareBazaar |
| TLSH | T1DD25AE9D79A872FFC857D971ADA81D64EA92B4770B4F520B855301BCCE8C583EE081B3 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe NanoCore |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
107.182.129.248:1010
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | ach_NanoCore |
|---|---|
| Author: | abuse.ch |
| Rule name: | malware_Nanocore_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Nanocore in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_NanoCore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects NanoCore |
| Rule name: | nanocore_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | Nanocore_RAT_Feb18_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Nanocore RAT |
| Reference: | Internal Research - T2T |
| Rule name: | Nanocore_RAT_Feb18_1_RID2DF1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Nanocore RAT |
| Reference: | Internal Research - T2T |
| Rule name: | Nanocore_RAT_Gen_2 |
|---|---|
| Author: | Florian Roth |
| Description: | Detetcs the Nanocore RAT |
| Reference: | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
| Rule name: | Nanocore_RAT_Gen_2_RID2D96 |
|---|---|
| Author: | Florian Roth |
| Description: | Detetcs the Nanocore RAT |
| Reference: | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_nanocore_w0 |
|---|---|
| Author: | Kevin Breen <kevin@techanarchy.net> |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.