MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54d6296e33aa584185ee2fa2637143546b2a1cd147cbe5521f29247d9f59f848. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 54d6296e33aa584185ee2fa2637143546b2a1cd147cbe5521f29247d9f59f848
SHA3-384 hash: 3e02775c2905bf66ce84d5c2a82b393e364a28241a33662b2f7e3f63cd1b75f73b198374d389f6139ec7c130439dfa89
SHA1 hash: 855aa870dea764396d3700bff28bf26c6afcfcac
MD5 hash: a1700ca21d14f5971c52a9359eb1da07
humanhash: finch-twenty-quiet-bluebird
File name:Notifica di spedizione del servizio di corriere Bartolini.r11
Download: download sample
Signature NanoCore
File size:302'327 bytes
First seen:2020-06-16 05:32:51 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:BexHu4ZnVoSSWrTYiSaXUUVICS3Ozy5+eylgI71OhqqWkBoNqSLK:uSWrVId3Ozy58eIBwfkG
TLSH 9A542228748005BFC8F8CF913F6DD3DDD2459A9665162C27C60EDF899A94F29E02C1EE
Reporter abuse_ch
Tags:geo ITA NanoCore r11 RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: vps.yidagnp.com
Sending IP: 45.95.169.73
From: RICEVUTA STAMPA SERVIZIO CORRIERE BARTOLINI <info@yidagnp.com>
Subject: Re: Notifica di spedizione del servizio di corriere Bartolini
Attachment: Notifica di spedizione del servizio di corriere Bartolini.r11 (contains "Notifica di spedizione del servizio di corriere Bartolini.exe")

NanoCore RAT C2:
185.244.29.128:9995

Hosted on nVpn:

% Information related to '185.244.29.0 - 185.244.29.255'

% Abuse contact for '185.244.29.0 - 185.244.29.255' is 'abuse@gerber-edv.net'

inetnum: 185.244.29.0 - 185.244.29.255
netname: GERBER-NETWORK
descr: Wonsan, Kangwon-do
descr: Choson Minjujuui Inmin Konghwaguk
country: KP
admin-c: GN5022-RIPE
tech-c: GN5022-RIPE
org: ORG-GN148-RIPE
status: SUB-ALLOCATED PA
mnt-by: GERBER-MNT
created: 2018-01-31T19:41:57Z
last-modified: 2020-04-06T22:16:40Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-16 05:34:04 UTC
AV detection:
19 of 31 (61.29%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

rar 54d6296e33aa584185ee2fa2637143546b2a1cd147cbe5521f29247d9f59f848

(this sample)

  
Dropping
NanoCore
  
Delivery method
Distributed via e-mail attachment

Comments