MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 424d8d094142aa0b55c480702b9e0b3f7e35ce0f35ba1ebb05cbc155af524805. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 4
| SHA256 hash: | 424d8d094142aa0b55c480702b9e0b3f7e35ce0f35ba1ebb05cbc155af524805 |
|---|---|
| SHA3-384 hash: | b2157611155b41445ebe315c54afc16d53a8e05d132814b335b93a21a7c1c7149b6471ccb6547e17968713f81389b2c4 |
| SHA1 hash: | 2d9a94c35f078737f0204cc4a234ab571e609154 |
| MD5 hash: | cd5e9e37a271520c6db531f2ef1fbad4 |
| humanhash: | cold-timing-nuts-vegan |
| File name: | 238fffd89f2b14351b4ccdae94d250b1.exe |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 207'360 bytes |
| First seen: | 2020-03-30 22:01:06 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 6144:gLV6Bta6dtJmakIM5DSxxV2Pvj3Y+w5A+:gLV6Btpmkl2PvT0 |
| Threatray | 1'092 similar samples on MalwareBazaar |
| TLSH | C014CF5537A88A2FE2DE9679611242129338C2E3ACD3F3DE28D415B79F667E50A070D3 |
| Reporter | |
| Tags: | exe GuLoader NanoCore |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=1gczc2WKaokng8DGVfnaxvngUsr2FM-J4
Intelligence
File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Nanocore
Status:
Malicious
First seen:
2020-03-30 22:35:26 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
31 of 31 (100.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
nanocorerat
dridex
Similar samples:
+ 1'082 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
7fe7b0b7e97e32e26309cff2a59455231cc0b8916f1114d76149ebe2fddc6d4a
Dropped by
MD5 238fffd89f2b14351b4ccdae94d250b1
Dropped by
MD5 5613788a38665789ae9826236a307e07
Dropped by
GuLoader
Dropped by
SHA256 7fe7b0b7e97e32e26309cff2a59455231cc0b8916f1114d76149ebe2fddc6d4a
Dropped by
SHA256 c2a1bcca2f8eff0216210819931e8599dbcd3803a972cee2fb523c4c82139407
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.