MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68bdf2747408e5f948696b4285faf5c9f87aea79272212d96895f1978201270f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 16


Intelligence 16 IOCs 1 YARA 12 File information Comments

SHA256 hash: 68bdf2747408e5f948696b4285faf5c9f87aea79272212d96895f1978201270f
SHA3-384 hash: dda6f411ac99f52ca385f4d595245ac5f4628948e7ec6eab68593984bb3890daf8a8cbbc4e6bd60e8a6edcc8d0946495
SHA1 hash: 536fa825af8b13f342e3de6a9788ced939f2358d
MD5 hash: 2688e5ad80c30dc73f6d07bc1aeaae4f
humanhash: diet-football-three-december
File name:2688e5ad80c30dc73f6d07bc1aeaae4f.exe
Download: download sample
Signature NanoCore
File size:249'856 bytes
First seen:2021-12-01 14:32:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9f4693fc0c511135129493f2161d1e86 (250 x Neshta, 15 x Formbook, 14 x AgentTesla)
ssdeep 6144:k9dta6dtJmakIM5Kke2mTIWCJ3vokCALV6h:stpmkfke2mTI1Jfok1LV6h
Threatray 3'565 similar samples on MalwareBazaar
TLSH T19D34D016BBA5853FD19E49BC61114212877CD2E3ADD3F3EF68E414A68F263E10A0B1D7
Reporter abuse_ch
Tags:exe NanoCore RAT


Avatar
abuse_ch
NanoCore C2:
82.215.114.147:7777

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
82.215.114.147:7777 https://threatfox.abuse.ch/ioc/256829/

Intelligence


File Origin
# of uploads :
1
# of downloads :
228
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2688e5ad80c30dc73f6d07bc1aeaae4f.exe
Verdict:
Malicious activity
Analysis date:
2021-12-01 15:06:32 UTC
Tags:
rat nanocore

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the Windows directory
Modifying an executable file
Creating a window
Creating a file in the %AppData% subdirectories
Creating a file in the Program Files subdirectories
Creating a file
Launching a process
Searching for the window
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Enabling autorun with the shell\open\command registry branches
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Infecting executable files
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Behaviour
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware nanocore neshta overlay packed rat
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nanocore Neshta Thanos
Detection:
malicious
Classification:
rans.spre.troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Detected Nanocore Rat
Drops executable to a common third party application directory
Drops PE files with a suspicious file extension
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sigma detected: NanoCore
Sigma detected: Suspicius Add Task From User AppData Temp
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Nanocore RAT
Yara detected Neshta
Yara detected Thanos ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 531969 Sample: sV9APpgCon.exe Startdate: 01/12/2021 Architecture: WINDOWS Score: 100 54 joja.ddns.net 2->54 56 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 15 other signatures 2->62 9 sV9APpgCon.exe 4 2->9         started        13 sV9APpgCon.exe 3 2->13         started        15 dhcpmon.exe 3 2->15         started        signatures3 process4 file5 38 C:\Windows\svchost.com, PE32 9->38 dropped 40 C:\Users\user\AppData\Local\...\setup.exe, PE32 9->40 dropped 42 C:\Users\user\AppData\...\sV9APpgCon.exe, PE32 9->42 dropped 48 108 other malicious files 9->48 dropped 70 Creates an undocumented autostart registry key 9->70 72 Drops PE files with a suspicious file extension 9->72 74 Drops executable to a common third party application directory 9->74 76 Infects executable files (exe, dll, sys, html) 9->76 17 sV9APpgCon.exe 1 17 9->17         started        44 C:\Users\user\AppData\...\sV9APpgCon.exe.log, ASCII 13->44 dropped 46 C:\Users\user\AppData\...\dhcpmon.exe.log, ASCII 15->46 dropped signatures6 process7 dnsIp8 50 joja.ddns.net 82.215.114.147, 49763, 49764, 49772 SARKOR-ASSarkorTelecom-UztelecomUpstreamUZ Uzbekistan 17->50 52 192.168.2.1 unknown unknown 17->52 32 C:\Program Files (x86)\...\dhcpmon.exe, PE32 17->32 dropped 34 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 17->34 dropped 36 C:\Users\user\AppData\Local\...\tmpBD2D.tmp, XML 17->36 dropped 64 Protects its processes via BreakOnTermination flag 17->64 66 Uses schtasks.exe or at.exe to add and modify task schedules 17->66 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->68 22 schtasks.exe 1 17->22         started        24 schtasks.exe 1 17->24         started        26 backgroundTaskHost.exe 22 30 17->26         started        file9 signatures10 process11 process12 28 conhost.exe 22->28         started        30 conhost.exe 24->30         started       
Threat name:
Win32.Virus.Neshta
Status:
Malicious
First seen:
2021-11-27 00:43:20 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
44 of 45 (97.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:nanocore family:neshta evasion keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Adds Run key to start application
Checks whether UAC is enabled
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies system executable filetype association
NanoCore
Neshta
Malware Config
C2 Extraction:
joja.ddns.net:7777
127.0.0.1:7777
Unpacked files
SH256 hash:
68bdf2747408e5f948696b4285faf5c9f87aea79272212d96895f1978201270f
MD5 hash:
2688e5ad80c30dc73f6d07bc1aeaae4f
SHA1 hash:
536fa825af8b13f342e3de6a9788ced939f2358d
Detections:
win_nanocore_w0
Malware family:
NanoCore
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:MALWARE_Win_NanoCore
Author:ditekSHen
Description:Detects NanoCore
Rule name:MALWARE_Win_Neshta
Author:ditekSHen
Description:Detects Neshta
Rule name:MAL_Neshta_Generic
Author:Florian Roth
Description:Detects Neshta malware
Reference:Internal Research
Rule name:MAL_Neshta_Generic_RID2DC9
Author:Florian Roth
Description:Detects Neshta malware
Reference:Internal Research
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:nanocore_rat
Author:jeFF0Falltrades
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Feb18_1_RID2DF1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:Nanocore_RAT_Gen_2_RID2D96
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author:Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe 68bdf2747408e5f948696b4285faf5c9f87aea79272212d96895f1978201270f

(this sample)

  
Delivery method
Distributed via web download

Comments