MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d53439692180d901981bcff18c2d0db8b349a8f4118c5682943c5dd22678af94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: d53439692180d901981bcff18c2d0db8b349a8f4118c5682943c5dd22678af94
SHA3-384 hash: 129c2ee41a183449f3f7fe92cbca109ea184e5412e86b9dd1b35b00beaec87e4d68dc7b8e97c916a0c3be8dec547fa73
SHA1 hash: a90d84fdcf81064e3d0ca13986b8ef20ad8d6659
MD5 hash: 28a3e03546cfd0aece72694b57d150ff
humanhash: six-oven-violet-fanta
File name:28a3e03546cfd0aece72694b57d150ff.exe
Download: download sample
Signature NanoCore
File size:788'480 bytes
First seen:2020-07-21 07:06:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d8412990f74f880a4a63b66fdb523827 (11 x AgentTesla, 8 x Loki, 5 x FormBook)
ssdeep 12288:3ZnGUxq0RwFvcGHq8TxFsb4mOKKEzem/nfw0qzAX6FrWX5OmLd1:BGuqtFvm8TxmZlzfffw0hWiXgmLd1
Threatray 2'682 similar samples on MalwareBazaar
TLSH 7AF4B066F2D00837C16B2B3F5C1B97A59829BF5D2D24AA4627F45CCC5F38781383A1A7
Reporter abuse_ch
Tags:exe NanoCore nVpn RAT


Avatar
abuse_ch
NanoCore RAT C2:
snup2020.ddns.net:1996 (194.5.97.22)

Hosted on nVpn:

% Information related to '194.5.97.0 - 194.5.97.255'

% Abuse contact for '194.5.97.0 - 194.5.97.255' is 'abuse@privacyfirst.sh'

inetnum: 194.5.97.0 - 194.5.97.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-FR4
country: FR
descr: Vitry-sur-Seine
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: SUB-ALLOCATED PA
mnt-by: PRIVACYFIRST-MNT
created: 2018-07-23T09:31:45Z
last-modified: 2020-07-16T21:25:46Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Creating a file in the Program Files subdirectories
Creating a file in the %temp% directory
Deleting a recently created file
Connection attempt
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Enabling autorun with Startup directory
Result
Threat name:
Nanocore
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 248538 Sample: DQaLHF5biu.exe Startdate: 21/07/2020 Architecture: WINDOWS Score: 100 111 snup2020.ddns.net 2->111 121 Found malware configuration 2->121 123 Malicious sample detected (through community Yara rule) 2->123 125 Multi AV Scanner detection for dropped file 2->125 127 10 other signatures 2->127 13 DQaLHF5biu.exe 2->13         started        16 wpasv.exe 2->16         started        18 wpasv.exe 2->18         started        20 2 other processes 2->20 signatures3 process4 signatures5 153 Writes to foreign memory regions 13->153 155 Allocates memory in foreign processes 13->155 157 Queues an APC in another process (thread injection) 13->157 159 Contains functionality to detect sleep reduction / modifications 13->159 22 notepad.exe 5 13->22         started        26 notepad.exe 16->26         started        28 notepad.exe 18->28         started        161 Maps a DLL or memory area into another process 20->161 30 sjsjnfjgk.exe 20->30         started        32 sjsjnfjgk.exe 3 20->32         started        34 sjsjnfjgk.exe 20->34         started        process6 file7 103 C:\Users\user\AppData\...\sjsjnfjgk.exe, PE32 22->103 dropped 105 C:\Users\...\sjsjnfjgk.exe:Zone.Identifier, ASCII 22->105 dropped 143 Creates files in alternative data streams (ADS) 22->143 145 Drops VBS files to the startup folder 22->145 36 sjsjnfjgk.exe 22->36         started        107 C:\Users\user\AppData\Roaming\...\web.vbs, ASCII 26->107 dropped 39 sjsjnfjgk.exe 26->39         started        41 sjsjnfjgk.exe 28->41         started        147 Maps a DLL or memory area into another process 30->147 43 sjsjnfjgk.exe 30->43         started        45 sjsjnfjgk.exe 30->45         started        109 C:\Users\user\AppData\...\sjsjnfjgk.exe.log, ASCII 32->109 dropped signatures8 process9 signatures10 129 Multi AV Scanner detection for dropped file 36->129 131 Detected unpacking (changes PE section rights) 36->131 133 Detected unpacking (creates a PE file in dynamic memory) 36->133 137 3 other signatures 36->137 47 sjsjnfjgk.exe 1 15 36->47         started        52 sjsjnfjgk.exe 36->52         started        135 Maps a DLL or memory area into another process 39->135 54 sjsjnfjgk.exe 39->54         started        56 sjsjnfjgk.exe 39->56         started        58 sjsjnfjgk.exe 41->58         started        60 sjsjnfjgk.exe 41->60         started        62 sjsjnfjgk.exe 43->62         started        process11 dnsIp12 113 snup2020.ddns.net 47->113 115 194.5.97.22, 1996, 49723, 49724 DANILENKODE Netherlands 47->115 95 C:\Program Files (x86)\...\wpasv.exe, PE32 47->95 dropped 97 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 47->97 dropped 99 C:\Users\user\AppData\Local\...\tmp7D2A.tmp, XML 47->99 dropped 101 C:\...\wpasv.exe:Zone.Identifier, ASCII 47->101 dropped 117 Hides that the sample has been downloaded from the Internet (zone.identifier) 47->117 64 schtasks.exe 1 47->64         started        66 schtasks.exe 1 47->66         started        68 sjsjnfjgk.exe 54->68         started        71 sjsjnfjgk.exe 58->71         started        119 Maps a DLL or memory area into another process 62->119 73 sjsjnfjgk.exe 62->73         started        75 sjsjnfjgk.exe 62->75         started        file13 signatures14 process15 signatures16 77 sjsjnfjgk.exe 64->77         started        80 conhost.exe 64->80         started        82 conhost.exe 66->82         started        139 Maps a DLL or memory area into another process 68->139 141 Sample uses process hollowing technique 68->141 84 sjsjnfjgk.exe 71->84         started        86 sjsjnfjgk.exe 71->86         started        process17 signatures18 163 Maps a DLL or memory area into another process 77->163 88 sjsjnfjgk.exe 77->88         started        90 sjsjnfjgk.exe 77->90         started        process19 process20 92 sjsjnfjgk.exe 88->92         started        signatures21 149 Maps a DLL or memory area into another process 92->149 151 Sample uses process hollowing technique 92->151
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-21 07:08:08 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
nanocore
Score:
  10/10
Tags:
upx evasion trojan keylogger stealer spyware family:nanocore persistence
Behaviour
NTFS ADS
Creates scheduled task(s)
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Loads dropped DLL
Drops startup file
UPX packed file
Executes dropped EXE
NanoCore
Malware Config
C2 Extraction:
snup2020.ddns.net:1996
194.5.97.22:1996
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NanoCore

Executable exe d53439692180d901981bcff18c2d0db8b349a8f4118c5682943c5dd22678af94

(this sample)

  
Delivery method
Distributed via web download

Comments