MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22a20fb79fcaca1650feed77df6e53d69afd6300e97135ca043ab6f423c018ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 22a20fb79fcaca1650feed77df6e53d69afd6300e97135ca043ab6f423c018ef
SHA3-384 hash: e92c5a4456586aaf33d5bfd2703327d8031363157fdc695ff076f3b04819d1b7840403d11e0baeef8a41be2d179c4e75
SHA1 hash: 37494a1be7d5ed8cea527aebc0b79cbdd3927847
MD5 hash: a1eeba1e8e8e29607e0e58d690b83182
humanhash: pluto-ack-india-item
File name:POEA MEMORANDUM NO. 61- 2020 SERIES.LZH
Download: download sample
Signature NanoCore
File size:870'876 bytes
First seen:2020-06-10 06:57:45 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:kkRbtbWd6zbGt9zJRAnvXVNY2VSbGqhfLAK:tRRWt9zJenfV62gb5GK
TLSH B1053377D0B454BB20B206E097B93E6E060E6BA797A3D37526E5CB73DC1335D8892324
Reporter abuse_ch
Tags:lzh NanoCore nVpn RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: gmmgroupasia.wsiph2.com
Sending IP: 173.230.147.68
From: POEA <info1@poea.gov.ph>
Subject: POEA MEMORANDUM NO. 60-2020.SECOND REMINDER!
Attachment: POEA MEMORANDUM NO. 61- 2020 SERIES.LZH (contains "POEA MEMORANDUM NO. 61- 2020 SERIES.PDF.exe")

NanoCore RAT C2:
aashkanani22.casacam.net:54985 (79.134.225.73)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Backdoor.NanoBot
Status:
Malicious
First seen:
2020-06-10 06:59:03 UTC
AV detection:
18 of 31 (58.06%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

rar 22a20fb79fcaca1650feed77df6e53d69afd6300e97135ca043ab6f423c018ef

(this sample)

  
Dropping
NanoCore
  
Delivery method
Distributed via e-mail attachment

Comments