MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ada3ad1cc888de7d953ebf448b0a5c5c8ef54dbc15ae51a9309d1d935133d355. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 11
| SHA256 hash: | ada3ad1cc888de7d953ebf448b0a5c5c8ef54dbc15ae51a9309d1d935133d355 |
|---|---|
| SHA3-384 hash: | 6f666138f91adc05d3c5aa39739d077fe99e26d5db2175b35a384b5546a6e81782489224ae2c0e1f083eb280a8dee79a |
| SHA1 hash: | efaaf4a915e151a6165becf5d832fa7de3989505 |
| MD5 hash: | 585707e9c426d15c1dfd96c49dcc5944 |
| humanhash: | helium-speaker-sixteen-sink |
| File name: | EGE.exe |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 700'416 bytes |
| First seen: | 2020-09-25 16:24:26 UTC |
| Last seen: | 2020-09-25 16:38:18 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:IRX5do6sNCWX8B21AqrwYNaoDrYubENDsEg3WCf5pNgcTWgcNERS8/q4GLjRhzWQ:2X5dxsEWvj0saoI54f |
| Threatray | 1'081 similar samples on MalwareBazaar |
| TLSH | 4CE4399C7650B6DFC86BCD32CAA81C24EA90B4BB430BD243A06715ED9D0D99BDF151F2 |
| Reporter | |
| Tags: | exe NanoCore |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
ada3ad1cc888de7d953ebf448b0a5c5c8ef54dbc15ae51a9309d1d935133d355
5b7643a4e7a407636d5c078fc063f2e59b22078db3f6c67c23a7c0a3366897d7
bd44e6df67de6dd2fda3a630e0d01a92e636f28a87f8f2b771cb2c017f90153d
9e08f4bedc659a9e1d7f476cdf1cf63928e09b12cd6b1b2393a16ea2ab7cfe03
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | ach_NanoCore |
|---|---|
| Author: | abuse.ch |
| Rule name: | Nanocore |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Nanocore in memory |
| Reference: | internal research |
| Rule name: | Nanocore_RAT_Feb18_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Nanocore RAT |
| Reference: | Internal Research - T2T |
| Rule name: | Nanocore_RAT_Gen_2 |
|---|---|
| Author: | Florian Roth |
| Description: | Detetcs the Nanocore RAT |
| Reference: | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
| Rule name: | win_nanocore_w0 |
|---|---|
| Author: | Kevin Breen <kevin@techanarchy.net> |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.