MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5aad4e2ad582c6fe27f4f7d2a9c526115cf40f9227385cb9e2c5d160c85bf11b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 16


Intelligence 16 IOCs YARA 15 File information Comments

SHA256 hash: 5aad4e2ad582c6fe27f4f7d2a9c526115cf40f9227385cb9e2c5d160c85bf11b
SHA3-384 hash: 79db7937a2c08bb0772c5c56780105f6f1f3ac1ae9366a776473568472463321608c20b340d99602c0c41a8b4ac3af63
SHA1 hash: 0ebb963dc8226ff95f26b90ae148fd02154ef39b
MD5 hash: 051ce434ea8ea139cb3fc0cd61b21a99
humanhash: yankee-pasta-south-violet
File name:051ce434ea8ea139cb3fc0cd61b21a99.exe
Download: download sample
Signature NanoCore
File size:599'000 bytes
First seen:2024-01-07 01:10:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b1a57b635b23ffd553b3fd1e0960b2bd (39 x Formbook, 29 x Loki, 27 x AgentTesla)
ssdeep 12288:ij34VVCbFKQNt4qQwhZ43CA2TxixwYl06HHbWJQSE88pvtmcSfWl:i8HW/eCrTAwYl06H7l391B
Threatray 900 similar samples on MalwareBazaar
TLSH T199D4F111ED448CA2E07ACD300CB78662EEED6FD6D520C5C277607BC5DAF71A2762B1A1
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
dhash icon e4f4ccccccd4e8f0 (9 x NanoCore, 2 x RemcosRAT, 1 x zgRAT)
Reporter abuse_ch
Tags:exe NanoCore RAT


Avatar
abuse_ch
NanoCore C2:
85.195.105.85:7072

Intelligence


File Origin
# of uploads :
1
# of downloads :
432
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected Nanocore Rat
Detected unpacking (creates a PE file in dynamic memory)
Drops executable to a common third party application directory
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1370845 Sample: 44W8gt2VbN.exe Startdate: 07/01/2024 Architecture: WINDOWS Score: 100 52 Snort IDS alert for network traffic 2->52 54 Multi AV Scanner detection for domain / URL 2->54 56 Found malware configuration 2->56 58 8 other signatures 2->58 8 44W8gt2VbN.exe 18 2->8         started        11 Acrobat!.exe 2->11         started        14 Acrobat!.exe 2->14         started        process3 file4 38 C:\Users\user\AppData\Local\Temp\ufyabb.exe, PE32 8->38 dropped 16 ufyabb.exe 1 1 8->16         started        60 Multi AV Scanner detection for dropped file 11->60 62 Detected unpacking (creates a PE file in dynamic memory) 11->62 64 Detected Nanocore Rat 11->64 68 2 other signatures 11->68 20 Acrobat!.exe 12 11->20         started        23 conhost.exe 11->23         started        66 Maps a DLL or memory area into another process 14->66 25 Acrobat!.exe 3 14->25         started        signatures5 process6 dnsIp7 34 C:\Users\user\AppData\...\Acrobat!.exe, PE32 16->34 dropped 42 Multi AV Scanner detection for dropped file 16->42 44 Detected Nanocore Rat 16->44 46 Machine Learning detection for dropped file 16->46 50 3 other signatures 16->50 27 ufyabb.exe 16->27         started        40 kennynanobelintourismedleonline.dumb1.com 85.195.105.85, 49740, 49742, 49743 GODADDYDE Germany 20->40 36 C:\Users\user\AppData\Roaming\...\run.dat, data 20->36 dropped 48 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->48 30 dw20.exe 1 15 20->30         started        file8 signatures9 process10 signatures11 70 Detected Nanocore Rat 27->70 32 WerFault.exe 21 16 27->32         started        process12
Threat name:
Win32.Trojan.TrickGate
Status:
Malicious
First seen:
2023-12-30 07:38:00 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
family:nanocore evasion keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Executes dropped EXE
Loads dropped DLL
NanoCore
Malware Config
C2 Extraction:
kennynanobelintourismedleonline.dumb1.com:7072
Unpacked files
SH256 hash:
50d3c94c0f515bf017e6f1dedafe3e668e16d3399e0d03740f6bc950f48857bd
MD5 hash:
a92276aa2666b098fa583a17d11045d7
SHA1 hash:
01eb3d6de04458b38984c3c0f127d5074af5f1fe
Detections:
win_nanocore_w0 Nanocore_RAT_Feb18_1 Nanocore_RAT_Gen_2 Nanocore MALWARE_Win_NanoCore
SH256 hash:
2e29bd4c75ff22b4c7ea9e794a5229f11c0bbe6db23eee437ae113ef453f08c7
MD5 hash:
339f3cb05a163c54ce835b7a0bea2fcd
SHA1 hash:
784734a0c17fabf582338800dbf8c3345c60cb8e
Detections:
win_nanocore_w0 Nanocore_RAT_Feb18_1 Nanocore_RAT_Gen_2 Nanocore MALWARE_Win_NanoCore
SH256 hash:
5aad4e2ad582c6fe27f4f7d2a9c526115cf40f9227385cb9e2c5d160c85bf11b
MD5 hash:
051ce434ea8ea139cb3fc0cd61b21a99
SHA1 hash:
0ebb963dc8226ff95f26b90ae148fd02154ef39b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_SliverFox_String
Author:huoji
Description:Detect files is `SliverFox` malware
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:malware_Nanocore_strings
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:MALWARE_Win_NanoCore
Author:ditekSHen
Description:Detects NanoCore
Rule name:nanocore_rat
Author:jeFF0Falltrades
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth (Nextron Systems)
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Feb18_1_RID2DF1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth (Nextron Systems)
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:Nanocore_RAT_Gen_2_RID2D96
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Windows_Trojan_Nanocore_d8c4e3c5
Author:Elastic Security
Rule name:win_nanocore_w0
Author:Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments