MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b0210dd37e5461785bd5d0b1fab796e76ef46c4a2999781710196d391cccb55. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4b0210dd37e5461785bd5d0b1fab796e76ef46c4a2999781710196d391cccb55
SHA3-384 hash: a54b93482ee895a72e36da9402df3b32ccbe624a6845ef5495fc884ddf116ee59ecbc2dc9ae6d2c978886e9c2f8bb7c1
SHA1 hash: ba2968ecd207ab95af551f77b1147f92d1f25243
MD5 hash: 959385d29e0c57adf02941fd585c16e4
humanhash: april-sodium-early-winner
File name:RFQ-BOHB-SS-FD6L4.exe
Download: download sample
Signature NanoCore
File size:1'102'848 bytes
First seen:2020-10-26 14:38:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 12288:xQIWOJGOOjmpiciI4U7j5RGkm/RcUslX1wVL7eDgrotGa3FgkDC:uUjOjP3OHG2l6VLq0rotGkF
Threatray 13 similar samples on MalwareBazaar
TLSH B135E0C4EFD9C516EDAE6BF2D5BE02048A30B8129B35DE4E46A4539A153374DE8C07E3
Reporter abuse_ch
Tags:exe NanoCore


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: vps.pantin-hoes.com
Sending IP: 45.95.169.163
From: ADL Industries <info@adl-gmbh.net>
Subject: Re:Request for Quotation, Our Ref. No : Sept 23/20-DE.
Attachment: RFQ-BOHB-SS-FD6L4.r11 (contains "RFQ-BOHB-SS-FD6L4.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file in the %AppData% directory
Launching the default Windows debugger (dwwin.exe)
Enabling autorun by creating a file
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Detected Nanocore Rat
Drops PE files to the startup folder
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-26 06:39:09 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Drops startup file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe 4b0210dd37e5461785bd5d0b1fab796e76ef46c4a2999781710196d391cccb55

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments