MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1feda728feb0187e19e099ddfcb542c608b3ec67149592520c1515bc6d3ada03. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 8


Intelligence 8 IOCs 1 YARA 10 File information Comments

SHA256 hash: 1feda728feb0187e19e099ddfcb542c608b3ec67149592520c1515bc6d3ada03
SHA3-384 hash: 10fc91c24501627874af5b853f7431959998c99309c895a061486b9cd96eaf13b07d8c51d7624c16ac36cda3025927fc
SHA1 hash: c8b4c809ab7bcabe1c29dc0c901e3af6ab779493
MD5 hash: 6fc65c14ff61433c356bfda77e0c6e41
humanhash: golf-kentucky-kilo-emma
File name:6fc65c14ff61433c356bfda77e0c6e41
Download: download sample
Signature NanoCore
File size:165'568 bytes
First seen:2021-06-30 18:21:12 UTC
Last seen:2021-06-30 18:41:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 3072:RsH8hiUNcplOhMdWZhEVJaSHlmx/YDWDK88g888AhdrZMs25TAkqXeQTbC3PTWSB:RsH8hiUNcplOhMdWZhEVJaSHlmx/YDWc
Threatray 2'121 similar samples on MalwareBazaar
TLSH 62F3F1A8D3BCBCD7F40AD0F99EB3B5A5961AEA5950240F1A3C2A3133547235338A5D1F
Reporter zbetcheckin
Tags:32 exe NanoCore signed

Code Signing Certificate

Organisation:R7593d4ip271zet5d5pabf7
Issuer:R7593d4ip271zet5d5pabf7
Algorithm:sha256WithRSAEncryption
Valid from:2021-06-29T22:01:12Z
Valid to:2022-06-29T22:01:12Z
Serial number: f7a5ef1f53fac26e5e8fdeaac515d3fd
Thumbprint Algorithm:SHA256
Thumbprint: 21a96ffdbe2deaa533c36e220b8e636d694f56988c18fb3ae51cb4a6cc4f4697
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
79.134.225.87:1985 https://threatfox.abuse.ch/ioc/156428/

Intelligence


File Origin
# of uploads :
2
# of downloads :
198
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6fc65c14ff61433c356bfda77e0c6e41
Verdict:
Malicious activity
Analysis date:
2021-06-30 18:25:05 UTC
Tags:
trojan nanocore rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to hide a thread from the debugger
Contains functionality to inject code into remote processes
Creates an autostart registry key pointing to binary in C:\Windows
Detected Nanocore Rat
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the startup folder
Drops PE files with benign system names
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Powershell adding suspicious path to exclusion list
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 442560 Sample: DDob4B3VuS Startdate: 30/06/2021 Architecture: WINDOWS Score: 100 94 kakosidobrosam.gq 2->94 96 prda.aadg.msidentity.com 2->96 110 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->110 112 Multi AV Scanner detection for domain / URL 2->112 114 Found malware configuration 2->114 116 12 other signatures 2->116 11 DDob4B3VuS.exe 15 4 2->11         started        16 tj85xg1cs.exe 2->16         started        18 svchost.exe 2->18         started        20 5 other processes 2->20 signatures3 process4 dnsIp5 100 kakosidobrosam.gq 172.67.180.37, 443, 49720, 49729 CLOUDFLARENETUS United States 11->100 92 C:\Users\user\AppData\...\DDob4B3VuS.exe.log, ASCII 11->92 dropped 126 Drops PE files to the startup folder 11->126 128 Contains functionality to inject code into remote processes 11->128 130 Adds a directory exclusion to Windows Defender 11->130 132 Drops PE files with benign system names 11->132 22 DDob4B3VuS.exe 5 8 11->22         started        134 Injects a PE file into a foreign processes 16->134 26 tj85xg1cs.exe 16->26         started        102 104.21.67.197, 443, 49732, 49735 CLOUDFLARENETUS United States 18->102 136 System process connects to network (likely due to code injection or exploit) 18->136 28 svchost.exe 18->28         started        138 Drops executables to the windows directory (C:\Windows) and starts them 20->138 30 WerFault.exe 20->30         started        file6 signatures7 process8 file9 84 C:\Windows\Resources\Themes\...\svchost.exe, PE32 22->84 dropped 86 C:\Users\user\AppData\...\tj85xg1cs.exe, PE32 22->86 dropped 88 C:\Windows\...\svchost.exe:Zone.Identifier, ASCII 22->88 dropped 90 C:\Users\...\tj85xg1cs.exe:Zone.Identifier, ASCII 22->90 dropped 118 Creates an autostart registry key pointing to binary in C:\Windows 22->118 120 Adds a directory exclusion to Windows Defender 22->120 122 Hides threads from debuggers 22->122 32 tj85xg1cs.exe 1 22->32         started        35 DDob4B3VuS.exe 22->35         started        39 powershell.exe 8 22->39         started        43 8 other processes 22->43 41 powershell.exe 26->41         started        124 Tries to evade analysis by execution special instruction which cause usermode exception 30->124 signatures10 process11 dnsIp12 104 Injects a PE file into a foreign processes 32->104 45 tj85xg1cs.exe 32->45         started        98 79.134.225.87, 1985, 49739 FINK-TELECOM-SERVICESCH Switzerland 35->98 78 C:\Users\user\AppData\Roaming\...\run.dat, data 35->78 dropped 80 C:\Program Files (x86)\...\dhcpmon.exe, PE32 35->80 dropped 106 Hides that the sample has been downloaded from the Internet (zone.identifier) 35->106 108 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 39->108 48 conhost.exe 39->48         started        82 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 43->82 dropped 50 conhost.exe 43->50         started        52 conhost.exe 43->52         started        54 conhost.exe 43->54         started        56 5 other processes 43->56 file13 signatures14 process15 signatures16 140 Adds a directory exclusion to Windows Defender 45->140 142 Hides threads from debuggers 45->142 58 cmd.exe 45->58         started        60 powershell.exe 45->60         started        62 powershell.exe 45->62         started        64 2 other processes 45->64 process17 process18 66 conhost.exe 58->66         started        68 timeout.exe 58->68         started        70 conhost.exe 60->70         started        72 conhost.exe 62->72         started        74 conhost.exe 64->74         started        76 conhost.exe 64->76         started       
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2021-06-30 18:22:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
16 of 29 (55.17%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
family:nanocore evasion keylogger persistence spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Drops startup file
Loads dropped DLL
Windows security modification
Executes dropped EXE
NanoCore
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
79.134.225.87:1985
127.0.0.1:1985
Unpacked files
SH256 hash:
1feda728feb0187e19e099ddfcb542c608b3ec67149592520c1515bc6d3ada03
MD5 hash:
6fc65c14ff61433c356bfda77e0c6e41
SHA1 hash:
c8b4c809ab7bcabe1c29dc0c901e3af6ab779493
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:nanocore_rat
Author:jeFF0Falltrades
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe 1feda728feb0187e19e099ddfcb542c608b3ec67149592520c1515bc6d3ada03

(this sample)

  
Delivery method
Distributed via web download

Comments