MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bdddf5f5fa10f55e58819ff4ae4cf11902c3583503fa8fcf50ce67b1f1f66e4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: bdddf5f5fa10f55e58819ff4ae4cf11902c3583503fa8fcf50ce67b1f1f66e4f
SHA3-384 hash: f30b1824cc383c5a2325d6caeef6076af5a23423488b99b098a2a9a3f4799b6d19d9dc73d188b71c776f2ed35875a965
SHA1 hash: 77530f6e0bc4848613ab6e27e32dccca886116ca
MD5 hash: d318f39ee75235bc046190cf8341e79f
humanhash: carolina-red-beryllium-jupiter
File name:OSE.exe
Download: download sample
Signature NanoCore
File size:696'320 bytes
First seen:2020-07-27 06:42:28 UTC
Last seen:2020-07-27 07:50:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f0b426c30c849bf2a18dc2e1e256eecc (5 x MassLogger, 3 x NanoCore, 1 x AgentTesla)
ssdeep 12288:h9Fs8CaE9aKhI+P7jwfwvBgPqcXWhZ6F478r+sUJH:TKW6h37jqrycgZ8478qsUJH
Threatray 2'562 similar samples on MalwareBazaar
TLSH 1BE4AFF2B2F04437D27326799D1B576CAC3ABE10392968462BF51C4C5F3AB81391B297
Reporter JAMESWT_WT
Tags:NanoCore

Intelligence


File Origin
# of uploads :
2
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Creating a file in the Program Files subdirectories
Creating a file in the %temp% directory
Deleting a recently created file
Connection attempt
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Enabling autorun with Startup directory
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates files in alternative data streams (ADS)
Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Drops script at startup location
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 251321 Sample: OSE.exe Startdate: 27/07/2020 Architecture: WINDOWS Score: 100 118 Found malware configuration 2->118 120 Malicious sample detected (through community Yara rule) 2->120 122 Multi AV Scanner detection for dropped file 2->122 124 10 other signatures 2->124 10 OSE.exe 2->10         started        13 wpasv.exe 2->13         started        15 wpasv.exe 2->15         started        17 2 other processes 2->17 process3 signatures4 134 Contains functionality to inject code into remote processes 10->134 136 Writes to foreign memory regions 10->136 138 Allocates memory in foreign processes 10->138 142 2 other signatures 10->142 19 notepad.exe 5 10->19         started        23 notepad.exe 2 13->23         started        25 notepad.exe 15->25         started        140 Maps a DLL or memory area into another process 17->140 27 gtguihjky.exe 17->27         started        29 gtguihjky.exe 17->29         started        31 gtguihjky.exe 3 17->31         started        process5 file6 84 C:\Users\user\AppData\...\gtguihjky.exe, PE32 19->84 dropped 86 C:\Users\...\gtguihjky.exe:Zone.Identifier, ASCII 19->86 dropped 126 Creates files in alternative data streams (ADS) 19->126 128 Drops VBS files to the startup folder 19->128 33 gtguihjky.exe 19->33         started        36 gtguihjky.exe 23->36         started        88 C:\Users\user\AppData\Roaming\...\web.vbs, ASCII 25->88 dropped 38 gtguihjky.exe 25->38         started        130 Maps a DLL or memory area into another process 27->130 40 gtguihjky.exe 27->40         started        42 gtguihjky.exe 27->42         started        44 gtguihjky.exe 29->44         started        90 C:\Users\user\AppData\...\gtguihjky.exe.log, ASCII 31->90 dropped signatures7 process8 signatures9 108 Multi AV Scanner detection for dropped file 33->108 110 Detected unpacking (changes PE section rights) 33->110 112 Detected unpacking (creates a PE file in dynamic memory) 33->112 116 3 other signatures 33->116 46 gtguihjky.exe 1 15 33->46         started        51 gtguihjky.exe 33->51         started        114 Maps a DLL or memory area into another process 36->114 53 gtguihjky.exe 36->53         started        55 gtguihjky.exe 36->55         started        57 gtguihjky.exe 38->57         started        59 gtguihjky.exe 38->59         started        61 gtguihjky.exe 40->61         started        63 gtguihjky.exe 44->63         started        65 gtguihjky.exe 44->65         started        process10 dnsIp11 100 185.165.153.30, 2177, 49735, 49736 DAVID_CRAIGGG Netherlands 46->100 102 godisgood.hopto.org 197.210.227.178, 2177 VCG-ASNG Nigeria 46->102 92 C:\Program Files (x86)\...\wpasv.exe, PE32 46->92 dropped 94 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 46->94 dropped 96 C:\Users\user\AppData\Local\...\tmp8A81.tmp, XML 46->96 dropped 98 C:\...\wpasv.exe:Zone.Identifier, ASCII 46->98 dropped 104 Hides that the sample has been downloaded from the Internet (zone.identifier) 46->104 67 schtasks.exe 1 46->67         started        69 schtasks.exe 1 46->69         started        71 gtguihjky.exe 53->71         started        106 Maps a DLL or memory area into another process 61->106 74 gtguihjky.exe 61->74         started        file12 signatures13 process14 signatures15 76 conhost.exe 67->76         started        78 conhost.exe 69->78         started        132 Maps a DLL or memory area into another process 71->132 80 gtguihjky.exe 71->80         started        82 gtguihjky.exe 71->82         started        process16
Threat name:
Win32.Trojan.DelfFareIt
Status:
Malicious
First seen:
2020-07-27 06:43:25 UTC
File Type:
PE (Exe)
Extracted files:
49
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
upx persistence evasion trojan keylogger stealer spyware family:nanocore
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
NTFS ADS
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
Creates scheduled task(s)
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run key to start application
Drops startup file
Loads dropped DLL
Executes dropped EXE
UPX packed file
NanoCore
Malware Config
C2 Extraction:
godisgood.hopto.org:2177
185.165.153.30:2177
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe bdddf5f5fa10f55e58819ff4ae4cf11902c3583503fa8fcf50ce67b1f1f66e4f

(this sample)

  
Delivery method
Distributed via web download

Comments