MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 abca0434af61ccbf707f5ea013f0c5f582106c9701552eeba5e64d678401dfd2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: abca0434af61ccbf707f5ea013f0c5f582106c9701552eeba5e64d678401dfd2
SHA3-384 hash: b83342b32d7a509076b27407804b205c194090f380484bbc3e61ee5cb24ae688f0053a03a2bf4f7aa10a847ce6afe6d1
SHA1 hash: 2f627c510f7fc0808d8e06b9b309f934acb439c0
MD5 hash: 1570be9489f6638e20884ea8b262f0a8
humanhash: vermont-carpet-wisconsin-triple
File name:Conform descrierii traducereProfil liniar355377.exe
Download: download sample
Signature NanoCore
File size:307'832 bytes
First seen:2021-10-22 10:50:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger)
ssdeep 6144:wBlL/cBTySWgMMtHXaqILNcK/GZbGFwCHoLV13fRWP:CeASWgMMI/OGmEQDRWP
TLSH T1BE64228B72C908F3CA06427194BAF336E3278525213652DF0B694E6E4AB13C7EE557C7
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter lowmal3
Tags:exe NanoCore

Intelligence


File Origin
# of uploads :
1
# of downloads :
315
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
conform7z.zip
Verdict:
Malicious activity
Analysis date:
2021-10-22 16:50:04 UTC
Tags:
rat nanocore

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Deleting a recently created file
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Detected Nanocore Rat
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nsisx
Status:
Malicious
First seen:
2021-10-22 10:51:05 UTC
AV detection:
13 of 45 (28.89%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
nanocorerat
Result
Malware family:
nanocore
Score:
  10/10
Tags:
family:nanocore evasion keylogger spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Loads dropped DLL
NanoCore
suricata: ET MALWARE Possible NanoCore C2 60B
Malware Config
C2 Extraction:
178.170.138.163:5626
Unpacked files
SH256 hash:
6d14b1574ae3e00d62e88cc6dcdaf8475b1d526b60f5b4dda9a9d6e35ab29a55
MD5 hash:
83d942647f772159eeda5a3b82cff1c1
SHA1 hash:
823535ff3ebaa8a8c6016bd204187f393e871aa6
SH256 hash:
abca0434af61ccbf707f5ea013f0c5f582106c9701552eeba5e64d678401dfd2
MD5 hash:
1570be9489f6638e20884ea8b262f0a8
SHA1 hash:
2f627c510f7fc0808d8e06b9b309f934acb439c0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe abca0434af61ccbf707f5ea013f0c5f582106c9701552eeba5e64d678401dfd2

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments