MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31fc16d69939d4b8b18df3d0781b38aedfb4520ad14befa70d64d4f72e27bee6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nitol


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 31fc16d69939d4b8b18df3d0781b38aedfb4520ad14befa70d64d4f72e27bee6
SHA3-384 hash: 9156da8bd31f2a5b58c68500f8bf958a5348dadd0a74b46bb67dd69c6653b6a91f01d8c6670226a411dde7b51c901966
SHA1 hash: 8589da7010602a88a1caaa7e07382a1c1b35a453
MD5 hash: 568563501bedc44175d2218a59a43a02
humanhash: september-vegan-triple-bulldog
File name:Server_se.exe
Download: download sample
Signature Nitol
File size:1'331'200 bytes
First seen:2022-08-18 13:53:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4f45d0568b71145fd91c177ffe4e3e8d (1 x Nitol)
ssdeep 24576:4VhELLwx8M7zzzJNQ5rk6QJJshNc7zwZdeYD6i7wvNeQjo95HoFN6WtljaEy9TM:4VhaIzBNur8JshKIZAYPmJjo95HoFN68
Threatray 14'380 similar samples on MalwareBazaar
TLSH T1C355D0C7BE371639D260657134255A8F97613EFE0A31407D22F9BE061A7B9E02D3AD0E
TrID 33.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
17.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
14.0% (.SCR) Windows screen saver (13101/52/3)
11.2% (.EXE) Win64 Executable (generic) (10523/12/4)
7.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon 00a2be9082828200 (4 x Nitol)
Reporter r3dbU7z
Tags:exe Nitol

Intelligence


File Origin
# of uploads :
1
# of downloads :
351
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Server_se.exe
Verdict:
Malicious activity
Analysis date:
2022-08-18 13:58:54 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
Сreating synchronization primitives
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed razy shell32.dll virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat, Nitol
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Checks if browser processes are running
Contains functionality to capture and log keystrokes
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Tries to detect virtualization through RDTSC time measurements
Yara detected GhostRat
Yara detected Nitol
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2022-08-18 13:54:10 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
chinese_generic_botnet
Score:
  10/10
Tags:
family:chinese_generic_botnet botnet
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates connected drives
Chinese Botnet payload
Generic Chinese Botnet
Unpacked files
SH256 hash:
b45a3f79fbe67afa35d3997a03fdd08088d9f146b790f3c2396d5b2b62c6ce13
MD5 hash:
948a923a5b03e0f452ab0083f765de33
SHA1 hash:
0a708187db759d53d523d6c425c7c3398510a585
SH256 hash:
31fc16d69939d4b8b18df3d0781b38aedfb4520ad14befa70d64d4f72e27bee6
MD5 hash:
568563501bedc44175d2218a59a43a02
SHA1 hash:
8589da7010602a88a1caaa7e07382a1c1b35a453
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Backdoor_Nitol_Jun17
Author:Florian Roth
Description:Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader
Reference:https://goo.gl/OOB3mH
Rule name:Backdoor_Nitol_Jun17_RID2E8F
Author:Florian Roth
Description:Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader
Reference:https://goo.gl/OOB3mH
Rule name:MALWARE_Win_Nitol
Author:ditekSHen
Description:Detects Nitol backdoor
Rule name:MAL_Nitol_Malware_Jan19_1
Author:Florian Roth
Description:Detects Nitol Malware
Reference:https://twitter.com/shotgunner101/status/1084602413691166721
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Nitol

Executable exe 31fc16d69939d4b8b18df3d0781b38aedfb4520ad14befa70d64d4f72e27bee6

(this sample)

  
Delivery method
Distributed via web download

Comments