MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a2cd283e2f30e88cea6a791a533760e6955b35ffa322e48f2feb6743f705220. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: 7a2cd283e2f30e88cea6a791a533760e6955b35ffa322e48f2feb6743f705220
SHA3-384 hash: 519b3ec49155628d05930ee8bfacaf824acbd0c4079cbe7337627ea0886ed41e80d10c2cf82cf3024abcecba2e7aff57
SHA1 hash: 0b5d98f5a6904e1a9dc1ac906baff36d0d37060d
MD5 hash: 6ffbaf75628eaf725ed231dcac783ef3
humanhash: mockingbird-pizza-low-whiskey
File name:PO 77390029.exe
Download: download sample
Signature NanoCore
File size:741'376 bytes
First seen:2020-10-09 06:35:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:usw9+TjLOryMAvi80AWd3yGN8vqvfJvkMnkT1i560nqVIwUWuQclOC:usw9+T/O2bi81WdiqdvfpkMnkI560ngc
Threatray 1'360 similar samples on MalwareBazaar
TLSH 4EF4E12273A86F85F27E677845301200A7F5B927E732E39D7DA900DE09A2F85D363752
Reporter abuse_ch
Tags:exe NanoCore nVpn RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: tonyhai
Sending IP: 117.121.213.232
From: Kanchana Shetty <dha@technogroupllc.com>
Subject: New Purchase Order
Attachment: PO 77390029.gz (contains "PO 77390029.exe")

NanoCore RAT C2:
79.134.225.91:1985

Hosted on nVpn:

% Information related to '79.134.225.0 - 79.134.225.127'

% Abuse contact for '79.134.225.0 - 79.134.225.127' is 'abuse@privacyfirst.sh'

inetnum: 79.134.225.0 - 79.134.225.127
netname: PRIVACYFIRST-EU
country: EU
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
status: ASSIGNED PA
mnt-by: AF15-MNT
org: ORG-TPP6-RIPE
created: 2020-07-14T15:26:02Z
last-modified: 2020-07-14T15:31:06Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Creating a file
Creating a file in the %AppData% subdirectories
Creating a file in the Program Files subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Enabling autorun by creating a file
Unauthorized injection to a system process
Result
Threat name:
Nanocore AgentTesla MailPassView
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Detected Nanocore Rat
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM_3
Yara detected MailPassView
Yara detected Nanocore RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 295659 Sample: PO 77390029.exe Startdate: 09/10/2020 Architecture: WINDOWS Score: 100 48 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 13 other signatures 2->54 7 PO 77390029.exe 7 2->7         started        11 dhcpmon.exe 4 2->11         started        process3 file4 32 C:\Users\user\AppData\...\FzLDeHCDhLGXmy.exe, PE32 7->32 dropped 34 C:\...\FzLDeHCDhLGXmy.exe:Zone.Identifier, ASCII 7->34 dropped 36 C:\Users\user\AppData\Local\...\tmpD114.tmp, XML 7->36 dropped 38 C:\Users\user\AppData\...\PO 77390029.exe.log, ASCII 7->38 dropped 68 Writes to foreign memory regions 7->68 70 Allocates memory in foreign processes 7->70 72 Injects a PE file into a foreign processes 7->72 13 RegSvcs.exe 1 13 7->13         started        18 schtasks.exe 1 7->18         started        20 conhost.exe 11->20         started        signatures5 process6 dnsIp7 46 79.134.225.91, 1985, 49731 FINK-TELECOM-SERVICESCH Switzerland 13->46 40 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 13->40 dropped 42 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->42 dropped 74 Writes to foreign memory regions 13->74 76 Allocates memory in foreign processes 13->76 78 Sample uses process hollowing technique 13->78 80 2 other signatures 13->80 22 vbc.exe 1 13->22         started        25 Kdott.exe 2 13->25         started        27 vbc.exe 13 13->27         started        30 conhost.exe 18->30         started        file8 signatures9 process10 dnsIp11 56 Tries to steal Mail credentials (via file registry) 22->56 58 Tries to steal Instant Messenger accounts or passwords 22->58 60 Tries to steal Mail credentials (via file access) 22->60 62 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 25->62 64 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 25->64 44 192.168.2.1 unknown unknown 27->44 66 Tries to harvest and steal browser information (history, passwords, etc) 27->66 signatures12
Threat name:
ByteCode-MSIL.Backdoor.NanoBot
Status:
Malicious
First seen:
2020-10-09 01:18:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
18
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
persistence spyware keylogger trojan stealer family:nanocore
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
Uses the VBS compiler for execution
NanoCore
Malware Config
C2 Extraction:
79.134.225.91:1985
127.0.0.1:1985
Unpacked files
SH256 hash:
7a2cd283e2f30e88cea6a791a533760e6955b35ffa322e48f2feb6743f705220
MD5 hash:
6ffbaf75628eaf725ed231dcac783ef3
SHA1 hash:
0b5d98f5a6904e1a9dc1ac906baff36d0d37060d
SH256 hash:
d3756a6c8a6e2124a4c0c4d80a6d3eb8f70b4d950c865834210283f519f71ce4
MD5 hash:
053addded5da364e2b2d72b4b17eb19b
SHA1 hash:
09566362b686867f10c3bd5c6b9a4e7ea793811a
SH256 hash:
13b24d3a09d099dabe41cd6cd71607a77e14640b1e9b4ed2d60f6c012f191c43
MD5 hash:
109cedae3c384a1913107f1efad2b7c8
SHA1 hash:
1f7f35b0ed85fa12bb839cbce698e59a30813420
SH256 hash:
59411090dac658627420de26e5942a88104ccd6ba4040a616180cdae4972c920
MD5 hash:
36e1004f6987da149d9ef4ee5e17e948
SHA1 hash:
7e2132e1883479ba88c2eae9ad42d934e47bbb04
Detections:
win_nanocore_w0
SH256 hash:
2804009902619fd8c0fa8bd271a3ff04007fd7932aada20985e80a7bcb10c1db
MD5 hash:
f033dbe2f9be1b697700b1d59618f3ec
SHA1 hash:
c1fc99534d7f3ddec7e78b299770c30f3135ca77
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe 7a2cd283e2f30e88cea6a791a533760e6955b35ffa322e48f2feb6743f705220

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments