MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be991fbee477b265767ac176f6e0c35de51c9616d58a4e72b1b2929d292fe0c1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: be991fbee477b265767ac176f6e0c35de51c9616d58a4e72b1b2929d292fe0c1
SHA3-384 hash: 2c6a0c60bff09cd6f5369a3e22a4805f34d6519d8f5b9b4658636ca682eeea03c62bb1b368bd550f4bb971d9d3976d8f
SHA1 hash: 55e2d28fd1cc4af0e51e0da47704f1a5c9dd3de4
MD5 hash: ea1a9e76f4b4ff8b4f6559a46f2da3fb
humanhash: seven-diet-bravo-comet
File name:ea1a9e76f4b4ff8b4f6559a46f2da3fb.exe
Download: download sample
Signature NanoCore
File size:749'056 bytes
First seen:2020-07-29 06:51:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e8ef47e85c79ee608837cc415c05c43b (15 x AgentTesla, 5 x NanoCore, 5 x Loki)
ssdeep 12288:rRXtpnVH9Az44BnvOCDhzcl0UdKndi2bnXVsOkccfNBhLV06giq:rfd8z4byilBdlGX989p06giq
Threatray 2'680 similar samples on MalwareBazaar
TLSH D9F4AF66B2E14832D1A72E389C1B57649F3ABEC0EE3C59452FFC1C4C5F396813866297
Reporter abuse_ch
Tags:exe NanoCore nVpn RAT


Avatar
abuse_ch
NanoCore RAT C2:
ndlovusamkello.hopto.org:3940 (185.140.53.132)

Pointing to nVpn:

% Information related to '185.140.53.0 - 185.140.53.255'

% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'

inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-EU3
country: EU
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-07-28T20:56:03Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Connection attempt
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Unauthorized injection to a system process
Enabling autorun with Startup directory
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates files in alternative data streams (ADS)
Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Drops script at startup location
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes to foreign memory regions
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 252922 Sample: DvYWRCSr5w.exe Startdate: 29/07/2020 Architecture: WINDOWS Score: 100 65 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->65 67 Found malware configuration 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 7 other signatures 2->71 11 DvYWRCSr5w.exe 2->11         started        14 wscript.exe 1 2->14         started        process3 signatures4 83 Contains functionality to inject code into remote processes 11->83 85 Writes to foreign memory regions 11->85 87 Allocates memory in foreign processes 11->87 89 2 other signatures 11->89 16 notepad.exe 5 11->16         started        20 hgyuj.exe 14->20         started        process5 file6 49 C:\Users\user\AppData\Roaming\...\hgyuj.exe, PE32 16->49 dropped 51 C:\Users\user\...\hgyuj.exe:Zone.Identifier, ASCII 16->51 dropped 53 C:\Users\user\AppData\Roaming\...\web.vbs, ASCII 16->53 dropped 59 Creates files in alternative data streams (ADS) 16->59 61 Drops VBS files to the startup folder 16->61 22 hgyuj.exe 16->22         started        63 Maps a DLL or memory area into another process 20->63 25 hgyuj.exe 20->25         started        27 hgyuj.exe 3 20->27         started        signatures7 process8 signatures9 73 Multi AV Scanner detection for dropped file 22->73 75 Detected unpacking (changes PE section rights) 22->75 77 Detected unpacking (creates a PE file in dynamic memory) 22->77 79 4 other signatures 22->79 29 hgyuj.exe 11 22->29         started        34 hgyuj.exe 22->34         started        36 hgyuj.exe 25->36         started        process10 dnsIp11 57 ndlovusamkello.hopto.org 185.140.53.132, 3940, 49732 DAVID_CRAIGGG Sweden 29->57 55 C:\Users\user\AppData\Roaming\...\run.dat, COM 29->55 dropped 91 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->91 93 Maps a DLL or memory area into another process 36->93 38 hgyuj.exe 36->38         started        40 hgyuj.exe 2 36->40         started        file12 signatures13 process14 process15 42 hgyuj.exe 38->42         started        signatures16 81 Maps a DLL or memory area into another process 42->81 45 hgyuj.exe 42->45         started        47 hgyuj.exe 42->47         started        process17
Threat name:
Win32.Trojan.DataStealer
Status:
Malicious
First seen:
2020-07-29 06:53:05 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
upx evasion trojan keylogger stealer spyware family:nanocore
Behaviour
Suspicious behavior: GetForegroundWindowSpam
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Loads dropped DLL
Drops startup file
UPX packed file
Executes dropped EXE
NanoCore
Malware Config
C2 Extraction:
ndlovusamkello.hopto.org:3940
185.140.53.132:3940
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe be991fbee477b265767ac176f6e0c35de51c9616d58a4e72b1b2929d292fe0c1

(this sample)

  
Delivery method
Distributed via web download

Comments