MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c40967ded56321a744c0e32a8e18216a906e38d35262693a21e95a9683a47441. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 6


Intelligence 6 IOCs YARA 5 File information Comments

SHA256 hash: c40967ded56321a744c0e32a8e18216a906e38d35262693a21e95a9683a47441
SHA3-384 hash: a4bc6e17451133d7e024f72f896841f80f2f8a8b0a93600a46b8e317b7d665990d17c42f4c4de4107704a4c6c847aa08
SHA1 hash: 7bddab10e162528d243fa30007aa23a6bca38ab3
MD5 hash: 8ad3acc5de878eaab476ed18990abe73
humanhash: fillet-mockingbird-lamp-black
File name:PO#7645.exe
Download: download sample
Signature NanoCore
File size:714'752 bytes
First seen:2020-06-30 13:31:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 24f26e153c9b6068c0a4770547eb6d9e (14 x Loki, 7 x AgentTesla, 2 x Formbook)
ssdeep 12288:WCbpcLhilrm7G8oclWEAroCo3DQmTMazdtFq6MVNls8J85:5uLhi80Jro7Bdi6qlsQ85
Threatray 1'099 similar samples on MalwareBazaar
TLSH 96E4AE22E7A0443FF172363D9D2B56BC9826BE51392C59472BE4DC4C6F39742393A287
Reporter abuse_ch
Tags:exe NanoCore RAT


Avatar
abuse_ch
Malspam distributing NanoCore:

HELO: server0.officereads.xyz
Sending IP: 23.254.225.57
From: PEMBE PROCUREMENT DEPT<procurement@pembe.co.ke>
Subject: QUOTATION
Attachment: PO7645.rar (contains "PO#7645.exe")

NanoCore RAT C2:
goat22.ddns.net:1989

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-30 13:33:04 UTC
AV detection:
27 of 48 (56.25%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
keylogger trojan stealer spyware family:nanocore persistence evasion
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run entry to start application
Drops startup file
UPX packed file
NanoCore
Malware Config
C2 Extraction:
goat22.ddns.net:1989
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe c40967ded56321a744c0e32a8e18216a906e38d35262693a21e95a9683a47441

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments