MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9ace84432d75c544407cd431881ac11ef75b60b5ae55f1375ef50afd6a8fb6ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 9ace84432d75c544407cd431881ac11ef75b60b5ae55f1375ef50afd6a8fb6ef
SHA3-384 hash: 2a0773ffdc6ebe631c4d4ca108ba928d38e094b55397d0ce2562bd0b6ab460da7653ccd3a10c8d0182fc757f22c1459c
SHA1 hash: 6883d185eba551c8eaddd9627b971e08f9c0ccd7
MD5 hash: a5b653043d8ff8bc91e32812d858e08d
humanhash: florida-mountain-fillet-timing
File name:???? (NYCU 2307-19TW)�pdf.exe
Download: download sample
Signature NanoCore
File size:788'520 bytes
First seen:2023-07-19 06:28:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4ea4df5d94204fc550be1874e1b77ea7 (245 x GuLoader, 31 x RemcosRAT, 26 x VIPKeylogger)
ssdeep 24576:cAteRR5D8pyagTQM708aNGWfotYvCX+e8tzegS3M3VS:HgVDvhQM708UGWfotYvI+XzegScFS
Threatray 849 similar samples on MalwareBazaar
TLSH T1A7F4231A2775D06BEECB3C3A2E36A61B5B61F2052192539B7344CC857A32784FB4C2F5
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe NanoCore signed

Code Signing Certificate

Organisation:
Issuer:
Algorithm:sha256WithRSAEncryption
Valid from:2022-12-22T02:38:21Z
Valid to:2025-12-21T02:38:21Z
Serial number: 0b742ddbc0348b0398cc36d6e0b44bc44afcb1c6
Thumbprint Algorithm:SHA256
Thumbprint: 0423ec497811bc6e1444fc404488b735e798410e6298fdff1a2a97e02308248b
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
350
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
guloader
ID:
1
File name:
b1faaf69-ed0a-4fc8-851f-cb5b86d6bf81
Verdict:
Malicious activity
Analysis date:
2023-07-19 06:40:59 UTC
Tags:
guloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader, Nanocore, MailPassView, Remcos
Detection:
malicious
Classification:
troj.evad.phis.spyw
Score:
100 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Contains functionality to modify clipboard data
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Detected Nanocore Rat
Disables UAC (registry)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected GuLoader
Yara detected MailPassView
Yara detected Nanocore RAT
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1275720 Sample: _____(NYCU_2307-19TW)#Ufffd... Startdate: 19/07/2023 Architecture: WINDOWS Score: 100 90 googlehosted.l.googleusercontent.com 2->90 92 drive.google.com 2->92 94 2 other IPs or domains 2->94 106 Snort IDS alert for network traffic 2->106 108 Multi AV Scanner detection for domain / URL 2->108 110 Malicious sample detected (through community Yara rule) 2->110 112 13 other signatures 2->112 11 _____(NYCU_2307-19TW)#Ufffdpdf.exe 9 79 2->11         started        15 remcos.exe 2->15         started        17 CasPol.exe 4 2->17         started        19 4 other processes 2->19 signatures3 process4 file5 84 C:\Users\user\AppData\...\glucopyranosyl.ars, DOS 11->84 dropped 86 C:\Users\user\AppData\Local\...\System.dll, PE32 11->86 dropped 140 Writes to foreign memory regions 11->140 142 Tries to detect Any.run 11->142 21 CasPol.exe 2 28 11->21         started        26 CasPol.exe 11->26         started        28 CasPol.exe 11->28         started        38 2 other processes 11->38 88 C:\Users\user\AppData\Local\...\System.dll, PE32 15->88 dropped 30 remcos.exe 15->30         started        32 conhost.exe 17->32         started        34 conhost.exe 19->34         started        36 conhost.exe 19->36         started        signatures6 process7 dnsIp8 100 wqqkgzmrdwxl8j.duckdns.org 91.193.75.249, 23591, 50189 DAVID_CRAIGGG Serbia 21->100 102 drive.google.com 142.250.181.238, 443, 50187 GOOGLEUS United States 21->102 104 googlehosted.l.googleusercontent.com 142.250.186.97, 443, 50188 GOOGLEUS United States 21->104 72 C:\Users\user\AppData\...\interfusing.exe, PE32 21->72 dropped 74 C:\Users\user\AppData\...\Task Manager.exe, PE32 21->74 dropped 76 C:\Users\user\AppData\Roaming\...\run.dat, data 21->76 dropped 78 2 other files (1 malicious) 21->78 dropped 118 Creates an undocumented autostart registry key 21->118 120 Writes to foreign memory regions 21->120 122 Tries to detect Any.run 21->122 126 3 other signatures 21->126 40 Task Manager.exe 21->40         started        44 vbc.exe 1 21->44         started        46 vbc.exe 14 21->46         started        48 3 other processes 21->48 124 Uses schtasks.exe or at.exe to add and modify task schedules 26->124 file9 signatures10 process11 file12 80 C:\Users\user\AppData\...\glucopyranosyl.ars, DOS 40->80 dropped 82 C:\Users\user\AppData\Local\...\System.dll, PE32 40->82 dropped 128 Tries to detect Any.run 40->128 50 Task Manager.exe 40->50         started        130 Tries to steal Mail credentials (via file registry) 44->130 132 Tries to steal Instant Messenger accounts or passwords 44->132 134 Tries to steal Mail credentials (via file / registry access) 44->134 136 Contains functionality to modify clipboard data 44->136 138 Tries to harvest and steal browser information (history, passwords, etc) 46->138 55 conhost.exe 48->55         started        57 conhost.exe 48->57         started        signatures13 process14 dnsIp15 96 142.250.185.142, 443, 50194, 50196 GOOGLEUS United States 50->96 98 172.217.23.97, 443, 50195, 50197 GOOGLEUS United States 50->98 68 C:\ProgramData\Remcos\remcos.exe, PE32 50->68 dropped 70 C:\Users\user\AppData\...\Kontrabasser.exe, PE32 50->70 dropped 114 Creates autostart registry keys with suspicious names 50->114 116 Tries to detect Any.run 50->116 59 cmd.exe 50->59         started        61 remcos.exe 50->61         started        file16 signatures17 process18 process19 63 reg.exe 59->63         started        66 conhost.exe 59->66         started        signatures20 144 Disables UAC (registry) 63->144
Threat name:
Win32.Trojan.InjectorX
Status:
Malicious
First seen:
2023-07-18 23:35:22 UTC
File Type:
PE (Exe)
Extracted files:
23
AV detection:
18 of 25 (72.00%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
family:guloader family:nanocore discovery downloader keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Checks QEMU agent file
Loads dropped DLL
Guloader,Cloudeye
NanoCore
Malware Config
C2 Extraction:
wqqkgzmrdwxl8j.duckdns.org:23591
Unpacked files
SH256 hash:
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
MD5 hash:
a4dd044bcd94e9b3370ccf095b31f896
SHA1 hash:
17c78201323ab2095bc53184aa8267c9187d5173
SH256 hash:
9ace84432d75c544407cd431881ac11ef75b60b5ae55f1375ef50afd6a8fb6ef
MD5 hash:
a5b653043d8ff8bc91e32812d858e08d
SHA1 hash:
6883d185eba551c8eaddd9627b971e08f9c0ccd7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments