MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b3e06e10d739a4e4c6207dba909e57c264994c09543a5101fe52da860e8a09a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 10
| SHA256 hash: | b3e06e10d739a4e4c6207dba909e57c264994c09543a5101fe52da860e8a09a9 |
|---|---|
| SHA3-384 hash: | b6fa15ba61a8cb66242f7a39dca4dc8848f691b548da62cd07e5fa8d5fcc598cb78af0f5553faa1c9d8d89eb283f0167 |
| SHA1 hash: | c5fc72385d8abb5be3f5d0281d723b3738fed66d |
| MD5 hash: | 4883df19a41690e59eb5e4771dc7d432 |
| humanhash: | march-robert-massachusetts-steak |
| File name: | Order_List_PO# 081929.exe |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 5'535'232 bytes |
| First seen: | 2021-01-18 07:49:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 98304:UmYY8iJYQHEsZZkn/vqgV/qwHEN0OMw76WnMEKGt0dSNBgW0Mp5WKpW:UCnc/vGwkN0OMw76W1JNB7023pW |
| Threatray | 124 similar samples on MalwareBazaar |
| TLSH | 6046129AD2ED100BC11479B4984BABEC1960ECBAFB50C6D57F41FCCEA971FD044A61E2 |
| Reporter | |
| Tags: | exe NanoCore RAT |
abuse_ch
Malspam distributing NanoCore:HELO: [208.123.119.103]
Sending IP: 208.123.119.103
From: Greg Bardin <sales@gommcp.com>
Reply-To: rrina-smediasys@post.com
Subject: Order List (PO# 081929)
Attachment: Order_List_PO 081929.iso (contains "Order_List_PO# 081929.exe")
NanoCore RAT C2:
nanopc.linkpc.net:40700 (185.157.161.86)
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
nanopc.linkpc.net:40700
Unpacked files
2d564ae361eb499ca493273e9fcfb88546105c88293c7633a7e1580a435cee9f
b93e5081bef10f47b8e037da155852225e10cb46b0bdbcab6d57a68364cb98da
900a45ab72e1145d8bbaa09fbb68c9d536782c4877ae844270f768a25bf1fc9f
b3e06e10d739a4e4c6207dba909e57c264994c09543a5101fe52da860e8a09a9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | ach_NanoCore |
|---|---|
| Author: | abuse.ch |
| Rule name: | Nanocore |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Nanocore in memory |
| Reference: | internal research |
| Rule name: | nanocore_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | Nanocore_RAT_Feb18_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Nanocore RAT |
| Reference: | Internal Research - T2T |
| Rule name: | Nanocore_RAT_Gen_2 |
|---|---|
| Author: | Florian Roth |
| Description: | Detetcs the Nanocore RAT |
| Reference: | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
| Rule name: | win_nanocore_w0 |
|---|---|
| Author: | Kevin Breen <kevin@techanarchy.net> |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.