MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e12d85aa606d45cdbb85982f5ea17d5c0b6f030dbbb30275ec0803f37c188a5b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nitol


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments

SHA256 hash: e12d85aa606d45cdbb85982f5ea17d5c0b6f030dbbb30275ec0803f37c188a5b
SHA3-384 hash: 4b8e09968dc8ababcaec1b98af0ee728d88ba2b50d023e1d995de3d4c59524b768553846b761e72c0dd4e9523da0967d
SHA1 hash: 66aef8129896c6e6dd36b2e3abadbbce7b4d51d6
MD5 hash: 7b1f03fb9936f72548c7d006eabfc310
humanhash: iowa-grey-beryllium-october
File name:7b1f03fb9936f72548c7d006eabfc310.exe
Download: download sample
Signature Nitol
File size:886'784 bytes
First seen:2023-02-12 19:23:36 UTC
Last seen:2023-02-12 20:34:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 320ffb3ead7d13ea9d4a4b7814c6523f (3 x Nitol)
ssdeep 24576:b2c2oVEmdgUwB4qM742kyxzDL/KHYAmCS:ac2osByEby5DL/Dr
Threatray 17'880 similar samples on MalwareBazaar
TLSH T1A41512C5DE7811B6E2BB15B0600760CCDAB41DA10E7CD8BB43E60795BAF13B8B576683
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 75757575757592b2 (6 x Nitol, 1 x Nloader, 1 x Gh0stRAT)
Reporter abuse_ch
Tags:exe Nitol

Intelligence


File Origin
# of uploads :
2
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7b1f03fb9936f72548c7d006eabfc310.exe
Verdict:
Malicious activity
Analysis date:
2023-02-12 19:30:06 UTC
Tags:
loader trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Searching for the window
Creating a window
Creating a file
Sending a custom TCP request
Сreating synchronization primitives
Creating a process from a recently created file
Searching for synchronization primitives
Enabling the 'hidden' option for recently created files
Moving a recently created file
Creating a file in the %temp% directory
Moving a file to the %temp% directory
Modifying an executable file
DNS request
Sending an HTTP GET request
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Sending an HTTP GET request to an infection source
Infecting executable files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed sality shell32.dll virus zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat, Nitol
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Checks if browser processes are running
Contains functionality to capture and log keystrokes
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Tries to detect virtualization through RDTSC time measurements
Yara detected GhostRat
Yara detected Nitol
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 805531 Sample: D77wDrFT4o.exe Startdate: 12/02/2023 Architecture: WINDOWS Score: 100 33 Multi AV Scanner detection for domain / URL 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 Antivirus detection for URL or domain 2->37 39 6 other signatures 2->39 7 D77wDrFT4o.exe 2 14 2->7         started        11 D77wDrFT4o.exe 13 2->11         started        13 D77wDrFT4o.exe 12 2->13         started        process3 dnsIp4 27 121.4.98.100, 10086 ONQ-AS-APOnQAU China 7->27 29 106.52.15.123, 80 CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa China 7->29 31 47.93.60.63, 8000 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 7->31 41 Detected unpacking (changes PE section rights) 7->41 43 Checks if browser processes are running 7->43 45 Contains functionality to capture and log keystrokes 7->45 47 Tries to detect virtualization through RDTSC time measurements 7->47 15 cmd.exe 2 7->15         started        49 Hides threads from debuggers 11->49 17 cmd.exe 2 11->17         started        19 cmd.exe 2 13->19         started        signatures5 process6 process7 21 conhost.exe 15->21         started        23 conhost.exe 17->23         started        25 conhost.exe 19->25         started       
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2023-02-11 12:56:50 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
chinese_generic_botnet
Score:
  10/10
Tags:
family:chinese_generic_botnet botnet persistence
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
Chinese Botnet payload
Generic Chinese Botnet
Unpacked files
SH256 hash:
80c844d068746c802f4bb98e212450e3dddbb16d5d91350563b57507eb5d6cb5
MD5 hash:
987277355f1294a69197e15a66568934
SHA1 hash:
9aa32c9923f98fa6756c91f0857c73d5c4c1d06b
SH256 hash:
e12d85aa606d45cdbb85982f5ea17d5c0b6f030dbbb30275ec0803f37c188a5b
MD5 hash:
7b1f03fb9936f72548c7d006eabfc310
SHA1 hash:
66aef8129896c6e6dd36b2e3abadbbce7b4d51d6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Backdoor_Nitol_Jun17
Author:Florian Roth (Nextron Systems)
Description:Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader
Reference:https://goo.gl/OOB3mH
Rule name:Backdoor_Nitol_Jun17_RID2E8F
Author:Florian Roth
Description:Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader
Reference:https://goo.gl/OOB3mH
Rule name:MALWARE_Win_Nitol
Author:ditekSHen
Description:Detects Nitol backdoor
Rule name:MAL_Nitol_Malware_Jan19_1
Author:Florian Roth (Nextron Systems)
Description:Detects Nitol Malware
Reference:https://twitter.com/shotgunner101/status/1084602413691166721
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Windows_Trojan_Gh0st_ee6de6bc
Author:Elastic Security
Description:Identifies a variant of Gh0st Rat

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Nitol

Executable exe e12d85aa606d45cdbb85982f5ea17d5c0b6f030dbbb30275ec0803f37c188a5b

(this sample)

  
Delivery method
Distributed via web download

Comments