MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d57d55535f8c1c4e4f656f444b1030dff3f4d657c57400d6f0b569a0ecd278e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 9d57d55535f8c1c4e4f656f444b1030dff3f4d657c57400d6f0b569a0ecd278e
SHA3-384 hash: ef128c56a339bb9105104339583d83f45b89b7d50f18c6e30c33c6dd5083217a3f87b43b0f9146816b06c0c36a0a5d16
SHA1 hash: 1a310ec1648a3e85e8c131f7ce46a9e05277cbb2
MD5 hash: 080a6aaef52b56af369415ec4eb3e96d
humanhash: mango-football-missouri-seven
File name:STATEMENT OF ACCOUNT - JULY'24.exe
Download: download sample
Signature NanoCore
File size:160'256 bytes
First seen:2020-07-24 10:15:45 UTC
Last seen:2020-07-24 11:03:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 3072:m1OcyEA5/zcIE4NYYo3iNs8O8Fn7qmZyu2nhTIH+VOxzytFEdnapc8:m1uplzc+Y7SBPnR2TIeVSAFpc8
Threatray 881 similar samples on MalwareBazaar
TLSH 9FF3CF4CFEA8EA31C61E46BA81D2A24557318C276042EB5F78D9B66D03737C63C4E5CB
Reporter abuse_ch
Tags:exe NanoCore nVpn RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: nemcco.com
Sending IP: 45.137.22.78
From: procurement@nemcco.com
Subject: STATEMENT OF ACCOUNT - JULY'23
Attachment: STATEMENT OF ACCOUNT - JULY24.zip (contains "STATEMENT OF ACCOUNT - JULY'24.exe")

NanoCore RAT C2:
79.134.225.21:60512

Hosted on nVpn:
% Information related to '79.134.225.0 - 79.134.225.127'

% Abuse contact for '79.134.225.0 - 79.134.225.127' is 'abuse@privacyfirst.sh'

inetnum: 79.134.225.0 - 79.134.225.127
netname: PRIVACYFIRST-EU
country: EU
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
status: ASSIGNED PA
mnt-by: AF15-MNT
org: ORG-TPP6-RIPE
created: 2020-07-14T15:26:02Z
last-modified: 2020-07-14T15:31:06Z
source: RIPE

Intelligence


File Origin
# of uploads :
2
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a window that notifies about a problem with the file start
Setting a keyboard event handler
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Enabling autorun
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 250830 Sample: STATEMENT OF ACCOUNT - JULY... Startdate: 24/07/2020 Architecture: WINDOWS Score: 100 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for dropped file 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 9 other signatures 2->54 7 STATEMENT OF ACCOUNT - JULY'24.exe 12 2->7         started        process3 file4 38 C:\Users\user\AppData\Roaming\tmp.exe, PE32 7->38 dropped 40 C:\Users\user\AppData\Local\Temp\svhost.exe, PE32 7->40 dropped 42 C:\Users\user\AppData\...\name.exe.lnk, MS 7->42 dropped 44 2 other malicious files 7->44 dropped 10 tmp.exe 1 2 7->10         started        14 svhost.exe 7->14         started        16 cmd.exe 1 7->16         started        18 4 other processes 7->18 process5 dnsIp6 46 79.134.225.21, 49717, 49718, 49722 FINK-TELECOM-SERVICESCH Switzerland 10->46 58 Antivirus detection for dropped file 10->58 60 Multi AV Scanner detection for dropped file 10->60 62 BOT functionalities found, sample is likely a BOT 10->62 70 4 other signatures 10->70 64 Contains functionality to steal Chrome passwords or cookies 14->64 66 Contains functionality to capture and log keystrokes 14->66 68 Contains functionality to steal Firefox passwords or cookies 14->68 21 reg.exe 1 1 16->21         started        24 conhost.exe 16->24         started        34 C:\Users\user\AppData\Roaming\...\name.exe, PE32 18->34 dropped 36 C:\Users\user\...\name.exe:Zone.Identifier, ASCII 18->36 dropped 26 conhost.exe 18->26         started        28 conhost.exe 18->28         started        30 conhost.exe 18->30         started        32 2 other processes 18->32 file7 signatures8 process9 signatures10 56 Creates an undocumented autostart registry key 21->56
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2020-07-24 01:53:00 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
rat family:remcos
Behaviour
Suspicious behavior: EnumeratesProcesses
Delays execution with timeout.exe
NTFS ADS
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
79.134.225.21:60512
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe 9d57d55535f8c1c4e4f656f444b1030dff3f4d657c57400d6f0b569a0ecd278e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments