MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65603c7a88beb93205d2012ca8d63dba310fc0f7f91fc81300734ee3b2eb3f10. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 2 File information 4 Yara 5 Comments

SHA256 hash: 65603c7a88beb93205d2012ca8d63dba310fc0f7f91fc81300734ee3b2eb3f10
SHA3-384 hash: 408df0e416ecdd1af87ea9235005d922dd601f6ef4cab4e63d386a707f1502b15b99571fb101afff0a7c8e3db9ba6a04
SHA1 hash: ae8832bcefff293fd6d4c29d00362e3ed5a2202c
MD5 hash: 931d6095b12f270ab926dd037d3b8430
humanhash: zebra-alaska-don-oscar
File name:Update on Stamp Duty Charges on Paga.pdf.scr
Download: download sample
Signature NanoCore
File size:485'376 bytes
First seen:2020-06-30 13:20:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:MSA9RevhnbEQezkxFn8CCtdnnsycp90aLK7eUXKSQHUJyqCLuIk+xxiTRqSw:wObRezkxFn8CA+iqjUXZQHUJSyIAUSw
TLSH 06A4B06567E8EC14D63FA735B670B015817AAF07D55AE70E7C4CB5EA28723803842E8F
Reporter @abuse_ch
Tags:NanoCore RAT scr


Twitter
@abuse_ch
Malspam distributing NanoCore:

HELO: vps11112.inmotionhosting.com
Sending IP: 192.145.237.232
From: Paga comms <no-reply@mypaga.com>
Reply-To: Paga <PAGAA@mail.com>
Subject: Update on Stamp Duty Charges on paga
Attachment: Update on Stamp Duty Charges on Paga.pdf.zip (contains "Update on Stamp Duty Charges on Paga.pdf.scr")

NanoCore RAT C2:
grace532.sytes.net:1919

Intelligence


Mail intelligence
Trap location Impact
Global Low
# of uploads 1
# of downloads 31
Origin country FR FR
CAPE Sandbox Detection:n/a
Link: https://www.capesandbox.com/analysis/17208/
ClamAV SecuriteInfo.com.MSIL.GenKryptik.ENIA.32641.UNOFFICIAL
CERT.PL MWDB Detection:nanocore
Link: https://mwdb.cert.pl/sample/65603c7a88beb93205d2012ca8d63dba310fc0f7f91fc81300734ee3b2eb3f10/
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Genkryptik
First seen:2020-06-30 13:22:06 UTC
AV detection:21 of 31 (67.74%)
Threat level:   5/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:nanocore
Link: https://tria.ge/reports/200630-akwekcmml2/
Tags:evasion trojan keylogger stealer spyware family:nanocore persistence
Config extraction:grace532.sytes.net:1919
VirusTotal:Virustotal results 27.40%

Yara Signatures


Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe 65603c7a88beb93205d2012ca8d63dba310fc0f7f91fc81300734ee3b2eb3f10

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments