MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3e3a0d4264a9b475696aba1bc5963c510560335c0399909c524fcaa5fcee4b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 1 File information 3 Yara 5 Comments

SHA256 hash: e3e3a0d4264a9b475696aba1bc5963c510560335c0399909c524fcaa5fcee4b5
SHA1 hash: d39219033b59417b6ff897259f74ef3f511cb835
MD5 hash: 96169d2d11ba98a5afc25cac39bfa543
File name:RFQ.exe
Download: download sample
Signature NanoCore
File size:1'483'776 bytes
First seen:2020-05-23 11:37:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091
ssdeep 24576:Ztb20pkaCqT5TBWgNQ7aVvqclBYjblKvhEbmSNwH7DEM4igFB6A:qVg5tQ7aVrlBubUvhim57DEes5
TLSH 4265CE1263DD8264C37E51737A15B701AEBB7C253AA1FC7B2FD4192CA9301215E0EA6F
Reporter @abuse_ch
Tags:exe NanoCore nVpn RAT


Twitter
@abuse_ch
Malspam distributing NanoCore:

HELO: ilezoni.pw
Sending IP: 173.82.238.171
From: Tommy Chan <info@ilezoni.pw>
Reply-To: alauddiinns@gmail.com
Subject: Request For Quotation
Attachment: RFQ.arj (contains "RFQ.exe")

NanoCore RAT C2:
185.244.29.132:1985

Hosted on nVpn:

% Information related to '185.244.29.0 - 185.244.29.255'

% Abuse contact for '185.244.29.0 - 185.244.29.255' is 'abuse@gerber-edv.net'

inetnum: 185.244.29.0 - 185.244.29.255
netname: GERBER-NETWORK
descr: Wonsan, Kangwon-do
descr: Choson Minjujuui Inmin Konghwaguk
country: KP
admin-c: GN5022-RIPE
tech-c: GN5022-RIPE
org: ORG-GN148-RIPE
status: SUB-ALLOCATED PA
mnt-by: GERBER-MNT
created: 2018-01-31T19:41:57Z
last-modified: 2020-04-06T22:16:40Z
source: RIPE


Intelligence


Mail intelligence
Trap location Impact
Global Low
# of uploads 1
# of downloads 24
Origin country FR FR
ClamAV Sanesecurity.Malware.27686.AidExe.UNOFFICIAL
SecuriteInfo.com.PSW.Agent.BORA.UNOFFICIAL
VirusTotal:Virustotal results 38.03%

Yara Signatures


Rule name:ach_NanoCore
Author:abuse.ch
Rule name:Nanocore
Author:JPCERT/CC Incident Response Group
Description:detect Nanocore in memory
Reference:internal research
Rule name:Nanocore_RAT_Feb18_1
Author:Florian Roth
Description:Detects Nanocore RAT
Reference:Internal Research - T2T
Rule name:Nanocore_RAT_Gen_2
Author:Florian Roth
Description:Detetcs the Nanocore RAT
Reference:https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Rule name:win_nanocore_w0
Author: Kevin Breen <kevin@techanarchy.net>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

Executable exe e3e3a0d4264a9b475696aba1bc5963c510560335c0399909c524fcaa5fcee4b5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments