MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fcb95c2dcc4b1c0573738b6a7327454441e352bed2553531d27225da4d8db8c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NanoCore


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: fcb95c2dcc4b1c0573738b6a7327454441e352bed2553531d27225da4d8db8c8
SHA3-384 hash: 2f1c15ef8989a03abe6dfe35d148bc14656a02e9ea83abe301537691b73c4ef6bae073d659eaeac89ff2f699c773adbd
SHA1 hash: fb1dcff245b794601352045ae95280a5e909dba9
MD5 hash: 412c77609987f0f132a67c5fed402e4b
humanhash: oxygen-purple-sodium-violet
File name:PO350KW30021.rar
Download: download sample
Signature NanoCore
File size:13'166 bytes
First seen:2021-03-22 12:39:41 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 384:Z20MRAP7eaCNgOw7Q8xdlWF15u0xwpBo4Zq:Z20MR3aCN1425u02pq4E
TLSH 2E42BF057A48F16B41ED0E6BFF9677FC0BEBE97267335491AAC8132C4C94908415E873
Reporter cocaman
Tags:NanoCore rar


Avatar
cocaman
Malicious email (T1566.001)
From: ""Kelmi Kabir" <kelmi.k@jbn.com>" (likely spoofed)
Received: "from server0.pacifictrades.xyz (unknown [86.106.131.11]) "
Date: "22 Mar 2021 03:50:55 -0700"
Subject: "JBN PO 350KW300/21 "
Attachment: "PO350KW30021.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
162
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-22 03:53:56 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
20 of 48 (41.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NanoCore

rar fcb95c2dcc4b1c0573738b6a7327454441e352bed2553531d27225da4d8db8c8

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
NanoCore

Comments