MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d0a05bee1ed3dde1d37ddd662d2368511d18d3f6145da453adae0c250b90614. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 3 File information Comments

SHA256 hash: 6d0a05bee1ed3dde1d37ddd662d2368511d18d3f6145da453adae0c250b90614
SHA3-384 hash: 3972aa5634f2c3f456ede36a0c9473f4987c757084be78581b2bff35111e9a060fec4fd1ed00ca0c213cbb941bbcf190
SHA1 hash: 1cd332bc89ca56f08fc52cc8674e9169810f3eac
MD5 hash: 1a3db07ce99e3d321989c9eb53b5000e
humanhash: diet-carpet-sixteen-echo
File name:Order EA566821.exe
Download: download sample
Signature NanoCore
File size:433'816 bytes
First seen:2021-06-15 01:21:42 UTC
Last seen:2021-06-15 01:46:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 12288:/YhIdTP9FNq0AwWQR2amUyS0YeYnghAHa:whkFAzQgxUDebUa
Threatray 81 similar samples on MalwareBazaar
TLSH 2A941240AB264212FD4789BBE1F3CE895BA4BF2378D5E00630AC36594933397E1E561F
Reporter abuse_ch
Tags:exe NanoCore RAT


Avatar
abuse_ch
NanoCore C2:
95.217.232.91:54984

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
95.217.232.91:54984 https://threatfox.abuse.ch/ioc/114839/

Intelligence


File Origin
# of uploads :
2
# of downloads :
178
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Order EA566821.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-15 01:24:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Creates an undocumented autostart registry key
Detected Nanocore Rat
Hides that the sample has been downloaded from the Internet (zone.identifier)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Backdoor.NanoBot
Status:
Malicious
First seen:
2021-06-15 01:22:11 UTC
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
family:nanocore evasion keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Uses the VBS compiler for execution
NirSoft MailPassView
Nirsoft
Modifies WinLogon for persistence
NanoCore
Malware Config
C2 Extraction:
:0
Unpacked files
SH256 hash:
2f0a114b0c614fb52fcc1759e6f569fa27ca1f8b6a1375b30e218d3fe0606d32
MD5 hash:
6c1cdbe2ae35985998d6cdecd22b0632
SHA1 hash:
9d888695cb079945ada8d1388bace1c0b0b55033
SH256 hash:
c68bb32705afee45a916cb322436bcc81233616780302b1a81ebb91b20a5be5b
MD5 hash:
96417f723da62dccd484c7bdb40e139b
SHA1 hash:
545f3ddc9bc83380095c16f5332d6dbeadf2a249
Detections:
win_nanocore_w0
SH256 hash:
20bfa53939d7ed1ea71117060a88c55494ce76b50c80b68f004166ecc64f431f
MD5 hash:
ae43237f25a93d70c8279b438951b613
SHA1 hash:
2abbe4d06e41a3f8db246e38bbf3d97708bf89b8
SH256 hash:
6d0a05bee1ed3dde1d37ddd662d2368511d18d3f6145da453adae0c250b90614
MD5 hash:
1a3db07ce99e3d321989c9eb53b5000e
SHA1 hash:
1cd332bc89ca56f08fc52cc8674e9169810f3eac
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_731d40ae3f3a1fb2bc3d8395
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificate
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments