MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b27db23756f4ddbd30a3875e30cdbff6cdcc1650a46e3c5a032da6f85cfdceb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 1 File information 4 Yara 5 Comments

SHA256 hash: 5b27db23756f4ddbd30a3875e30cdbff6cdcc1650a46e3c5a032da6f85cfdceb
SHA3-384 hash: 9c74aac6d2fdcfb93f144b72fa4f5215272e7920b85062c2b295bdc899650aaec994eb7309088adefb704108147b7d92
SHA1 hash: f37c0ca9db58a784cf77712bcfaa6cf18233b495
MD5 hash: 4e0966f48e6fe2451eae96f7696dcab9
humanhash: arizona-hotel-low-harry
File name:wndll.exe
Download: download sample
Signature NanoCore
File size:317'440 bytes
First seen:2020-06-30 19:23:08 UTC
Last seen:2020-06-30 19:52:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:Wyuw3KZ2jvasqRLJgsaJwRZUwhhg5xH8XwCeKQAAXyQYCV8:76AjSsiLCCl8jYReKQAAXyQLV8
TLSH 0564028CBE84DA15C82F0934D4A6D3B08361DE279502D75F69E67C5FB9333DA240B26B
Reporter @abuse_ch
Tags:exe NanoCore RAT


Twitter
@abuse_ch
Malspam distributing NanoCore:

HELO: semf05.mfg.siteprotect.com
Sending IP: 64.26.60.168
From: Shawn McKay <info@couvretoit.com>
Reply-To: prepre080@vivaldi.net
Subject: RESENDING: Quotation Needed
Attachment: PO300620.doc

NanoCore payload URL:
http://mrgeek.pk/wndll.exe

NanoCore RAT payload URL:
gold1.dnsupdate.info:4777 (79.134.225.84)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


Mail intelligence No data
# of uploads 2
# of downloads 34
Origin country CH CH
ClamAV SecuriteInfo.com.Trojan.PackedNET.276.24420.10662.UNOFFICIAL
CERT.PL MWDB Detection:nanocore
Link: https://mwdb.cert.pl/sample/5b27db23756f4ddbd30a3875e30cdbff6cdcc1650a46e3c5a032da6f85cfdceb/
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Nanocore
First seen:2020-06-30 19:25:04 UTC
AV detection:35 of 48 (72.92%)
Threat level:   5/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:nanocore
Link: https://tria.ge/reports/200630-wapmqvr6ee/
Tags:evasion trojan keylogger stealer spyware family:nanocore
Config extraction:gold1.dnsupdate.info:4777
gold080.ooguy.com:4777
VirusTotal:Virustotal results 36.11%

Yara Signatures


Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe 5b27db23756f4ddbd30a3875e30cdbff6cdcc1650a46e3c5a032da6f85cfdceb

(this sample)

  
Delivery method
Distributed via web download

Comments