MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8eeeccb14c235e02647ce74a4bb4ff62d485141cd7aa3d997f2e8f9ce1c35a2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 4
| SHA256 hash: | 8eeeccb14c235e02647ce74a4bb4ff62d485141cd7aa3d997f2e8f9ce1c35a2d |
|---|---|
| SHA3-384 hash: | 69211c4df6432b5a4ef84cbfb5358a881830171165f86a43d57b8fff2edeff2baca6295a77609d06d1ce8c78dc20b6e8 |
| SHA1 hash: | 1a12604fac02412f11e816e8cc01fc6ac588f0be |
| MD5 hash: | ccc8715e7d91e3e48f2e16f84ce99b8e |
| humanhash: | cup-sweet-magnesium-blossom |
| File name: | Transfer details.r11 |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 660'675 bytes |
| First seen: | 2020-07-20 12:11:39 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:ur2G0UY5tpMsjmdvbeu24dZLUeFlZ//PJv4ycRuisA6LMHJM:6/0UYLtfSXFlZxvvcECq |
| TLSH | 7FE42337A0A2CF4C9441198A59B1795B4B338207DA362FB4D5FEE80FD3BB67B424543A |
| Reporter | |
| Tags: | NanoCore nVpn r11 RAT |
abuse_ch
Malspam distributing NanoCore:HELO: vps.orthilis.com
Sending IP: 45.95.169.120
From: Absa Group Limited <info@orthilis.com>
Subject: Re: Transfer details
Attachment: Transfer details.r11 (contains "yizPIXAjkEKIB89.exe")
NanoCore RAT C2:
myduck222.duckdns.org:6532 (185.140.53.11)
Pointing to nVpn:
% Information related to '185.140.53.0 - 185.140.53.255'
% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'
inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-BE-NL4
country: EU
descr: Zaventem, Belgium
descr: Amsterdam, Netherlands
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-07-16T21:16:41Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-20 12:13:07 UTC
AV detection:
17 of 48 (35.42%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
NanoCore
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.