Analysis Report FKL.exe

Overview

General Information

Sample Name: FKL.exe
Analysis ID: 412287
MD5: 5ec0dae4627e5c2bfedb9eec381df4c9
SHA1: bc1961f41857da071ae28d44060b2ffe5644c715
SHA256: d08baa103db6d39e3d3ec218fef3b9b368e1cee78c25c0abc0cb551d1ff28b36
Tags: exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score: 92
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for sample
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

AV Detection:

barindex
Found malware configuration
Source: 11.2.FKL.exe.400000.0.unpack Malware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "d42469ca-5662-45f6-9b4c-2ecfba7e", "Group": "Default", "Domain1": "", "Domain2": "hdgavzxcniopkjhsvcbnxmnzvqaswyiokdseacbu.ydns.eu", "Port": 1772, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Multi AV Scanner detection for submitted file
Source: FKL.exe Virustotal: Detection: 18% Perma Link
Source: FKL.exe ReversingLabs: Detection: 29%
Yara detected Nanocore RAT
Source: Yara match File source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY
Source: Yara match File source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Machine Learning detection for sample
Source: FKL.exe Joe Sandbox ML: detected
Source: FKL.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Networking:

barindex
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs:
Source: Malware configuration extractor URLs: hdgavzxcniopkjhsvcbnxmnzvqaswyiokdseacbu.ydns.eu
Source: FKL.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: FKL.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: FKL.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: FKL.exe String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: FKL.exe String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: FKL.exe String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: FKL.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: FKL.exe String found in binary or memory: http://ocsp.digicert.com0O
Source: FKL.exe String found in binary or memory: http://www.digicert.com/CPS0
Source: FKL.exe String found in binary or memory: https://www.digicert.com/CPS0

E-Banking Fraud:

barindex
Yara detected Nanocore RAT
Source: Yara match File source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY
Source: Yara match File source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
PE / OLE file has an invalid certificate
Source: FKL.exe Static PE information: invalid certificate
Sample file is different than original file name gathered from version info
Source: FKL.exe, 00000000.00000000.232391273.0000000000862000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameHMIr IzM.exe2 vs FKL.exe
Source: FKL.exe, 00000005.00000000.259487742.0000000000952000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000007.00000000.263613268.0000000000B92000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000008.00000000.270291539.0000000001052000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000009.00000002.274628751.0000000000E52000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000000A.00000000.275873725.00000000006D2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000000B.00000002.280858470.00000000011E2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000000D.00000000.281378452.0000000000872000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000000F.00000002.285289923.0000000001232000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000012.00000002.287444258.0000000000622000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000014.00000002.290432688.0000000000782000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000016.00000000.291737872.0000000000452000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000017.00000002.295986090.00000000005B2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000018.00000000.296727664.00000000011D2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000019.00000000.300222704.0000000000D42000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000001A.00000002.304131194.0000000000C62000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000001B.00000002.309806762.00000000008A2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000001C.00000002.312058974.0000000001022000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000001D.00000002.314384826.0000000000E42000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000001E.00000000.315682859.00000000005E2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 0000001F.00000002.320395663.0000000000842000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000020.00000000.321796902.00000000010F2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000021.00000002.326108746.0000000000362000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000022.00000002.328389736.0000000000ED2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000023.00000000.329742208.0000000001212000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000024.00000002.334532992.0000000000CA2000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000025.00000000.334692344.0000000000792000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000026.00000000.338712638.0000000000F62000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe, 00000027.00000002.343446698.0000000001182000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Source: FKL.exe Binary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs FKL.exe
Yara signature match
Source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: classification engine Classification label: mal92.troj.evad.winEXE@261/0@0/1
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6060:120:WilError_01
Source: FKL.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\FKL.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: FKL.exe Virustotal: Detection: 18%
Source: FKL.exe ReversingLabs: Detection: 29%
Source: unknown Process created: C:\Users\user\Desktop\FKL.exe 'C:\Users\user\Desktop\FKL.exe'
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\timeout.exe timeout 1
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1 Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\timeout.exe timeout 1 Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32 Jump to behavior
Source: FKL.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: FKL.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: FKL.exe Static file information: File size 2360024 > 1048576
Source: FKL.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x23e400
Source: FKL.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Data Obfuscation:

barindex
Binary contains a suspicious time stamp
Source: FKL.exe Static PE information: 0xD9F65925 [Sat Nov 17 01:55:49 2085 UTC]
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Contains capabilities to detect virtual machines
Source: C:\Users\user\Desktop\FKL.exe File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} Jump to behavior
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\FKL.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Hides threads from debuggers
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Thread information set: HideFromDebugger Jump to behavior
Enables debug privileges
Source: C:\Users\user\Desktop\FKL.exe Process token adjusted: Debug Jump to behavior
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\FKL.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1 Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: C:\Users\user\Desktop\FKL.exe C:\Users\user\Desktop\FKL.exe Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\timeout.exe timeout 1 Jump to behavior

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\FKL.exe Queries volume information: C:\Users\user\Desktop\FKL.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\FKL.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RAT
Source: Yara match File source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY
Source: Yara match File source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Detected Nanocore Rat
Source: FKL.exe, 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: FKL.exe, 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Yara detected Nanocore RAT
Source: Yara match File source: 0000001C.00000002.311600679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.339595106.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.279746517.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.320115217.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.284872015.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.303777475.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.328008188.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.322465865.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.270944975.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.265424770.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.260196506.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.309408324.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.314015376.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.282305726.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.335683538.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.274217304.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.342982982.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.332921030.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.330463227.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000019.00000002.300936350.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.290138059.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.276534690.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.297301031.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.404392176.000000000426F000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1276, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5836, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 6116, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5568, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1268, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5860, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5040, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 5540, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 1412, type: MEMORY
Source: Yara match File source: Process Memory Space: FKL.exe PID: 2196, type: MEMORY
Source: Yara match File source: 11.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 39.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 32.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 38.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.FKL.exe.400000.0.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 412287 Sample: FKL.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 92 25 Found malware configuration 2->25 27 Malicious sample detected (through community Yara rule) 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 4 other signatures 2->31 7 FKL.exe 3 2->7         started        process3 dnsIp4 23 192.168.2.1 unknown unknown 7->23 33 Hides threads from debuggers 7->33 11 cmd.exe 1 7->11         started        13 FKL.exe 7->13         started        15 FKL.exe 7->15         started        17 26 other processes 7->17 signatures5 process6 process7 19 conhost.exe 11->19         started        21 timeout.exe 1 11->21         started       
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious

Private

IP
192.168.2.1

Contacted URLs

Name Malicious Antivirus Detection Reputation
true
  • Avira URL Cloud: safe
low
hdgavzxcniopkjhsvcbnxmnzvqaswyiokdseacbu.ydns.eu true
  • Avira URL Cloud: safe
unknown