MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1a6530f34958885dc32b47f8995d4af7598b1fcdfdd19345c991b3a975bb5ce9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 4
| SHA256 hash: | 1a6530f34958885dc32b47f8995d4af7598b1fcdfdd19345c991b3a975bb5ce9 |
|---|---|
| SHA3-384 hash: | 300af9454bd5d637e80e7113bf3ca15b6649f187cc4f481a787a04ce850971bb0aa425fd1c4057dc97d28c4bcfe544de |
| SHA1 hash: | 6eb0a9b6a990ded1ca4e9bd200631afe5ac071f3 |
| MD5 hash: | a363622e6d53163d487add60b302db19 |
| humanhash: | leopard-cup-wyoming-echo |
| File name: | e25022ef4b34dcf246b66569188eeb73.exe |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 207'360 bytes |
| First seen: | 2020-03-30 13:20:19 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 6144:gLV6Bta6dtJmakIM5I4w9QT09e8iCp1Tz5klI:gLV6BtpmkFIIc8iCp1P5klI |
| Threatray | 1'090 similar samples on MalwareBazaar |
| TLSH | B114CF123BA94A2EE2DF8679612201139379C3E7A8D3F3DE19D451B35F263E50A470E7 |
| Reporter | |
| Tags: | exe GuLoader NanoCore |
abuse_ch
Payload dropped by GuLoader from the following URL:http://tobo-group.net/files/D%20payload_encrypted_1929500.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Nanocore
Status:
Malicious
First seen:
2020-03-30 13:35:28 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
31 of 31 (100.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
nanocorerat
Similar samples:
+ 1'080 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
414df9cd44ce730dd6cff4214ddfbc0be7d3d84e9b688e035e6c8b5d3ec50fea
Dropped by
MD5 e25022ef4b34dcf246b66569188eeb73
Dropped by
MD5 fee014728b4f5eb611a62cfd0ada2400
Dropped by
GuLoader
Dropped by
SHA256 414df9cd44ce730dd6cff4214ddfbc0be7d3d84e9b688e035e6c8b5d3ec50fea
Dropped by
SHA256 7afe789a8ba3b1198a9b7e367b08e3fe82b24f575a2ecd7d33b3fc3a305ccb55
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.