MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cf5dc3db5d69d77ed762ca73678955af3c9e6f1cecac5549a97d77c8104baf35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
NanoCore
Vendor detections: 3
| SHA256 hash: | cf5dc3db5d69d77ed762ca73678955af3c9e6f1cecac5549a97d77c8104baf35 |
|---|---|
| SHA3-384 hash: | ea717ab3a643ac49c8463f67ddb68fdc68a3bc8a92021c7027bb9035ec053a7c68bb63d3d3b5e0620dae9b9096a4752a |
| SHA1 hash: | c99ba355ad9ab88c28621bd7062aff607a2dd9ca |
| MD5 hash: | b5e88cef494d7d4c8a5ae6b732088b26 |
| humanhash: | blossom-blue-mississippi-oxygen |
| File name: | 采购查询_29-07-20.r11 |
| Download: | download sample |
| Signature | NanoCore |
| File size: | 426'227 bytes |
| First seen: | 2020-07-29 06:23:05 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:3yoX92BLoE4IyWz+hu25Hjz++ywyh1vDZfP43vyiJ:nNeLoEUD5unnht1PoJ |
| TLSH | 5C942361843E65E28B9C997D1D1E88342366D01377B8F0ECA7FC494B1EB987FCDA414A |
| Reporter | |
| Tags: | CHN geo NanoCore nVpn r11 RAT |
abuse_ch
Malspam distributing NanoCore:HELO: vps.uncethsa.com
Sending IP: 45.95.170.154
From: Chao Hsiu-wa <info@uncethsa.com>
Subject: Re: 曼福德 订单 查询
Attachment: 采购查询_29-07-20.r11 (contains "采购查询_29-07-20.exe")
NanoCore RAT C2:
tgfhgfd.casacam.net:6331 (194.5.97.25)
Pointing to nVpn:
% Information related to '194.5.97.0 - 194.5.97.255'
% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@kgb-vpn.org'
inetnum: 194.5.97.0 - 194.5.97.255
netname: NET-NINAZU
remarks: ------------------------------------------
remarks: * This network is used for a VPN service.
remarks: * No logs are stored in any shape or form.
remarks: ------------------------------------------
country: MD
admin-c: NVS100-RIPE
tech-c: NVS100-RIPE
abuse-c: NVS100-RIPE
org: ORG-KHd1-RIPE
status: SUB-ALLOCATED PA
mnt-by: NINAZU-MNT
created: 2018-07-23T09:31:45Z
last-modified: 2020-07-28T21:43:58Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-29 06:25:06 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
NanoCore
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.