MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 22b87205ec9b3ad2d29c4d48e8c895d72318a497b327ff7cab3ea0da5034e055. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 11
| SHA256 hash: | 22b87205ec9b3ad2d29c4d48e8c895d72318a497b327ff7cab3ea0da5034e055 |
|---|---|
| SHA3-384 hash: | b700536fecb8e21fe910895637e3ba49dc03a9c23cea72dffebb47d3d2f6c947174fd565e589c205cd040f4326019a96 |
| SHA1 hash: | 9bcdb582a96e0885e40e3d2d21af32a53bf18b17 |
| MD5 hash: | b72c37afc0d885f4ce1cf11fd3d88082 |
| humanhash: | king-cold-carbon-emma |
| File name: | B72C37AFC0D885F4CE1CF11FD3D88082.exe |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 1'087'589 bytes |
| First seen: | 2024-02-06 05:20:11 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 12e12319f1029ec4f8fcbed7e82df162 (389 x DCRat, 52 x RedLineStealer, 51 x Formbook) |
| ssdeep | 24576:tTbBv5rUMJdU7VBfqZMTGtR8B/hIdNCXYzJcW:nBhfMSZMTGoB/hWGW |
| TLSH | T14F351202FAD19471D07309725A766B11A9BCBD301FA58FCFA3C05A5EDE316C1EA317A2 |
| TrID | 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39) 3.5% (.EXE) Win64 Executable (generic) (10523/12/4) 2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 1.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 1.5% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | e001fcecc8c8c0c0 (1 x NanoCore) |
| Reporter | |
| Tags: | exe NanoCore RAT |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
december2nd.ddns.net:65517
Unpacked files
64f7f22452241592c6dc0e2c8e0f2cf44b52da13f9330e8c73211eb8e2d27906
7f24051d8ea086ac0d78f5cb8e0f127140aee0ec0ca7a9e3137dbae04b76dd70
a94efd2fd4a39e5412ae71262505321a76acccfbedd2b9aa0417721740be6bfd
da7842d0d6c33bc7faa51b5a0cb5cbb1d794091b79c4aa020166c2a7bd524b55
0ff02d4a400853d0569a43b93c05fcce01438ae71978eed25fd011e328a00a4f
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | ach_NanoCore |
|---|---|
| Author: | abuse.ch |
| Rule name: | malware_Nanocore_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Nanocore in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_NanoCore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects NanoCore |
| Rule name: | nanocore_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | Nanocore_RAT_Feb18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Nanocore RAT |
| Reference: | Internal Research - T2T |
| Rule name: | Nanocore_RAT_Feb18_1_RID2DF1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Nanocore RAT |
| Reference: | Internal Research - T2T |
| Rule name: | Nanocore_RAT_Gen_2 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detetcs the Nanocore RAT |
| Reference: | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
| Rule name: | Nanocore_RAT_Gen_2_RID2D96 |
|---|---|
| Author: | Florian Roth |
| Description: | Detetcs the Nanocore RAT |
| Reference: | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_Nanocore_d8c4e3c5 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_nanocore_w0 |
|---|---|
| Author: | Kevin Breen <kevin@techanarchy.net> |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.