MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c85af6654de339d867a88a73775a37ca5ad11db4e2c38ae079ff73022f203387. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 4
| SHA256 hash: | c85af6654de339d867a88a73775a37ca5ad11db4e2c38ae079ff73022f203387 |
|---|---|
| SHA3-384 hash: | e1f856a79d54941321c910c4ec143bc68ff45a0ff5d0e26f86eef2d21a3bc0d7f1c605450ab9252be2c68ad5c588d534 |
| SHA1 hash: | f3053c50e669ac5e0353ea0bd20e682fc32de385 |
| MD5 hash: | 834980d224c2d8a26ce82eb5511c66f1 |
| humanhash: | foxtrot-undress-jersey-four |
| File name: | 155040d08b93862a07423b00b19f0854.exe |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 207'360 bytes |
| First seen: | 2020-03-26 15:39:46 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 6144:wLV6Bta6dtJmakIM5SSxxV2Pvj3Y+w5A7:wLV6Btpmko2PvTN |
| Threatray | 1'192 similar samples on MalwareBazaar |
| TLSH | FF14CF5537A88A3FE2DE8679611242139339C2E3A8D3F3DE28D415B79F667E50A070D3 |
| Reporter | |
| Tags: | exe GuLoader NanoCore |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=1quKwhHBC7CgnMewUxy5Mj2PQD8nQpTaV
Intelligence
File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Nanocore
Status:
Malicious
First seen:
2020-03-26 16:37:04 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
31 of 31 (100.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
nanocorerat
dridex
Similar samples:
+ 1'182 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
1cfa598a17e585e2bd25a5827bffdc45dc0e66a9b7abab9b73368fb074da39d4
Dropped by
MD5 155040d08b93862a07423b00b19f0854
Dropped by
MD5 cbe3e96b07a133acb8d5d15175d66274
Dropped by
GuLoader
Dropped by
SHA256 1cfa598a17e585e2bd25a5827bffdc45dc0e66a9b7abab9b73368fb074da39d4
Dropped by
SHA256 cec2ba3e99cd53f9dfb0502b1a103b4dc4425e11d8749693bb0423520e642f16
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.