MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c21dd33437a7bce8ded30edd4ada42e9983fda78d67ffaab87fd695ecc774085. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c21dd33437a7bce8ded30edd4ada42e9983fda78d67ffaab87fd695ecc774085
SHA3-384 hash: b2d297b7becbe181deb23c9a8af5134bbc05b0232c653343c1f30a5d35beb77d54bbbc167e965bb4d56d1e5142d86be8
SHA1 hash: b5857d83701ca50f00db29c8a715c802b7250599
MD5 hash: 05a05759a7a03d9bf1d59100640a918e
humanhash: yankee-uncle-yellow-diet
File name:Receipt.img
Download: download sample
Signature NanoCore
File size:1'245'184 bytes
First seen:2020-07-21 18:35:18 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 12288:3Y0ryoeMgVV38lnyHSwsTW3uKipjjZFETU0LVz+6+O:9rBgz8isTW3fip3ZFETUa+4
TLSH B6459E00FBF4C5C6D3AA1F7AD47041009575F95AABE6E78B3B88F6AD19523984B03F12
Reporter abuse_ch
Tags:img NanoCore nVpn RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: comworks.servercontrol.com.au
Sending IP: 27.50.88.49
From: Accounts <billacceptance@payment.com>
Reply-To: johnnieanderson833@gmail.com
Subject: Thank you for your payment!
Attachment: Receipt.img (contains "Receipt.exe")

NanoCore RAT C2:
u852121.nvpn.to:3410 (79.134.225.112)

Hosted on nVpn:

% Information related to '79.134.225.0 - 79.134.225.127'

% Abuse contact for '79.134.225.0 - 79.134.225.127' is 'abuse@privacyfirst.sh'

inetnum: 79.134.225.0 - 79.134.225.127
netname: PRIVACYFIRST-EU
country: EU
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
status: ASSIGNED PA
mnt-by: AF15-MNT
org: ORG-TPP6-RIPE
created: 2020-07-14T15:26:02Z
last-modified: 2020-07-14T15:31:06Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.MassLogger
Status:
Malicious
First seen:
2020-07-21 18:37:06 UTC
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

img c21dd33437a7bce8ded30edd4ada42e9983fda78d67ffaab87fd695ecc774085

(this sample)

  
Dropping
NanoCore
  
Delivery method
Distributed via e-mail attachment

Comments