MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c565d01a652768c3bbe0f182a539f2edebb7f40bee9eb3cb8ac3f9cc683cb4c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 6
| SHA256 hash: | c565d01a652768c3bbe0f182a539f2edebb7f40bee9eb3cb8ac3f9cc683cb4c7 |
|---|---|
| SHA3-384 hash: | 53c8debb1ffff211989ec2e27d06dd523f5da241fc8cb1641c2d2093f3894deebe60ed84f26b7576fa0d9206ae895131 |
| SHA1 hash: | 177aa90d66c09a1c9b3bc16ddc53fb9c2e94e9b9 |
| MD5 hash: | bbd79508cc065e74817f9ba82441b894 |
| humanhash: | march-papa-papa-hawaii |
| File name: | PO.ace |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 443'290 bytes |
| First seen: | 2021-07-26 11:05:43 UTC |
| Last seen: | Never |
| File type: | ace |
| MIME type: | application/octet-stream |
| ssdeep | 12288:H7SFvbRr4MTsNfRoOm2xpGsHOaQwnmPivR:H2xOtpL7GFN0 |
| TLSH | T1F394237E19A258E53CB3B8A032199B399E65BE343856DEDAA2707CC38B119D01B581CD |
| Reporter | |
| Tags: | ace NanoCore |
cocaman
Malicious email (T1566.001)From: ""Dr COULIBALY HORO"< a.coulibalyhoro@npsp.ci>" (likely spoofed)
Received: "from npsp.ci (unknown [194.87.138.181]) "
Date: "26 Jul 2021 10:44:02 +0000"
Subject: "Re:Purchase Order for Supply"
Attachment: "PO.ace"
Intelligence
File Origin
# of uploads :
1
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-26 10:02:19 UTC
File Type:
Binary (Archive)
Extracted files:
9
AV detection:
13 of 28 (46.43%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
nanocore
Score:
10/10
Tags:
family:nanocore evasion keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks whether UAC is enabled
NanoCore
Malware Config
C2 Extraction:
ifybest85fff.ddns.net:7600
194.5.98.23:7600
194.5.98.23:7600
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.