MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 37bddf42525de673f8c88355875c5bed4035d5c5100ebece7c3aae162d3ba68f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: 37bddf42525de673f8c88355875c5bed4035d5c5100ebece7c3aae162d3ba68f
SHA3-384 hash: 298c43bb7eb5f1b126d621954fba2c270c7949778457a363b64bdc86cfd555ae429d534161bcc043bf6b77bb80098ad2
SHA1 hash: d0fd5086e9659699975c48f2eb18a2e7659c9509
MD5 hash: c9c1c87eda9f725e375d66952203a08e
humanhash: mississippi-minnesota-asparagus-september
File name:449818166_Invoice_Confirmation.exe
Download: download sample
Signature NanoCore
File size:388'608 bytes
First seen:2020-07-21 18:47:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:VyN/2ZUK5wAzjJ0tIA4HyLYTnoWZkgpbzbOuG9kFrKhopPHuKg1VmvWUibg8EE:VysSgvAzEowbuuaQPPHub5
Threatray 1'257 similar samples on MalwareBazaar
TLSH 8684BEAC27DCC1A9C35C8779E66A46F543B7AE06EC4DE64B7690FC4073F93861201B89
Reporter abuse_ch
Tags:exe NanoCore nVpn RAT


Avatar
abuse_ch
NanoCore RAT C2:
netccwomo.duckdns.org:9090 (185.140.53.63)

Hosted on nVpn:

% Information related to '185.140.53.0 - 185.140.53.255'

% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'

inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-BE-NL4
country: EU
descr: Zaventem, Belgium
descr: Amsterdam, Netherlands
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-07-16T21:16:41Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Creating a window
Creating a file in the %AppData% subdirectories
Forced shutdown of a system process
Connection attempt to an infection source
Enabling autorun with Startup directory
Unauthorized injection to a system process
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 249134 Sample: 449818166_Invoice_Confirmat... Startdate: 22/07/2020 Architecture: WINDOWS Score: 100 79 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 Multi AV Scanner detection for dropped file 2->83 85 9 other signatures 2->85 14 449818166_Invoice_Confirmation.exe 2 2->14         started        process3 file4 71 C:\Users\user\AppData\...\HJdyTuap.exe, PE32 14->71 dropped 103 Drops PE files to the startup folder 14->103 105 Maps a DLL or memory area into another process 14->105 18 449818166_Invoice_Confirmation.exe 1 14->18         started        21 RegAsm.exe 9 14->21         started        25 RegAsm.exe 14->25         started        signatures5 process6 dnsIp7 87 Maps a DLL or memory area into another process 18->87 27 449818166_Invoice_Confirmation.exe 1 18->27         started        30 RegAsm.exe 3 18->30         started        75 netccwomo.duckdns.org 185.140.53.63, 49715, 9090 DAVID_CRAIGGG Sweden 21->75 69 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 21->69 dropped 89 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->89 file8 signatures9 process10 file11 97 Maps a DLL or memory area into another process 27->97 33 449818166_Invoice_Confirmation.exe 27->33         started        36 RegAsm.exe 2 27->36         started        73 C:\Users\user\AppData\...\RegAsm.exe.log, ASCII 30->73 dropped signatures12 process13 signatures14 77 Maps a DLL or memory area into another process 33->77 38 449818166_Invoice_Confirmation.exe 33->38         started        41 RegAsm.exe 33->41         started        43 RegAsm.exe 33->43         started        process15 signatures16 93 Maps a DLL or memory area into another process 38->93 45 449818166_Invoice_Confirmation.exe 38->45         started        48 RegAsm.exe 38->48         started        process17 signatures18 99 Maps a DLL or memory area into another process 45->99 50 449818166_Invoice_Confirmation.exe 45->50         started        53 RegAsm.exe 45->53         started        process19 signatures20 91 Maps a DLL or memory area into another process 50->91 55 449818166_Invoice_Confirmation.exe 50->55         started        58 RegAsm.exe 50->58         started        60 RegAsm.exe 50->60         started        process21 signatures22 95 Maps a DLL or memory area into another process 55->95 62 449818166_Invoice_Confirmation.exe 55->62         started        65 RegAsm.exe 55->65         started        process23 signatures24 101 Maps a DLL or memory area into another process 62->101 67 RegAsm.exe 62->67         started        process25
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-07-21 18:49:05 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
keylogger trojan stealer spyware family:nanocore evasion
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Drops startup file
NanoCore
Malware Config
C2 Extraction:
netccwomo.duckdns.org:9090
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments