Loading ...

Play interactive tourEdit tour

Windows Analysis Report G2M8C76V_INV0ICE_RECEIPT.exe

Overview

General Information

Sample Name:G2M8C76V_INV0ICE_RECEIPT.exe
Analysis ID:552628
MD5:d272e884f59ff9d7921619f88766709d
SHA1:b9013dcffc28e174c1cb7d81fd46b6463b4ff579
SHA256:94a00e5d13eebc1a99dd48e2d9f9cb48935c424c6bd58ab9f6d78ff0caa36506
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Detected unpacking (creates a PE file in dynamic memory)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • G2M8C76V_INV0ICE_RECEIPT.exe (PID: 6964 cmdline: "C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe" MD5: D272E884F59FF9D7921619F88766709D)
    • G2M8C76V_INV0ICE_RECEIPT.exe (PID: 7092 cmdline: "C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe" MD5: D272E884F59FF9D7921619F88766709D)
  • chmac.exe (PID: 6288 cmdline: "C:\Users\user\AppData\Roaming\dihsw\chmac.exe" MD5: D272E884F59FF9D7921619F88766709D)
    • chmac.exe (PID: 6556 cmdline: "C:\Users\user\AppData\Roaming\dihsw\chmac.exe" MD5: D272E884F59FF9D7921619F88766709D)
  • chmac.exe (PID: 6760 cmdline: "C:\Users\user\AppData\Roaming\dihsw\chmac.exe" MD5: D272E884F59FF9D7921619F88766709D)
    • chmac.exe (PID: 6820 cmdline: "C:\Users\user\AppData\Roaming\dihsw\chmac.exe" MD5: D272E884F59FF9D7921619F88766709D)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "1f8684ca-0835-4252-89d1-4a2b1be1", "Group": "boy of john", "Domain1": "boyhome5100.duckdns.org", "Domain2": "boyhome5100.duckdns.org", "Port": 5100, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x123e5:$x1: NanoCore.ClientPluginHost
  • 0x12422:$x2: IClientNetworkHost
  • 0x15f55:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x1214d:$a: NanoCore
    • 0x1215d:$a: NanoCore
    • 0x12391:$a: NanoCore
    • 0x123a5:$a: NanoCore
    • 0x123e5:$a: NanoCore
    • 0x121ac:$b: ClientPlugin
    • 0x123ae:$b: ClientPlugin
    • 0x123ee:$b: ClientPlugin
    • 0x122d3:$c: ProjectData
    • 0x12cda:$d: DESCrypto
    • 0x1a6a6:$e: KeepAlive
    • 0x18694:$g: LogClientMessage
    • 0x1488f:$i: get_Connected
    • 0x13010:$j: #=q
    • 0x13040:$j: #=q
    • 0x1305c:$j: #=q
    • 0x1308c:$j: #=q
    • 0x130a8:$j: #=q
    • 0x130c4:$j: #=q
    • 0x130f4:$j: #=q
    • 0x13110:$j: #=q
    0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x111e5:$x1: NanoCore.ClientPluginHost
    • 0x11222:$x2: IClientNetworkHost
    • 0x14d55:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 92 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      16.2.chmac.exe.2906888.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      16.2.chmac.exe.2906888.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      14.2.chmac.exe.400000.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x215e5:$x1: NanoCore.ClientPluginHost
      • 0x21622:$x2: IClientNetworkHost
      • 0x25155:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      14.2.chmac.exe.400000.1.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x2135d:$x1: NanoCore Client.exe
      • 0x215e5:$x2: NanoCore.ClientPluginHost
      • 0x22c1e:$s1: PluginCommand
      • 0x22c12:$s2: FileCommand
      • 0x23ac3:$s3: PipeExists
      • 0x2987a:$s4: PipeCreated
      • 0x2160f:$s5: IClientLoggingHost
      14.2.chmac.exe.400000.1.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 341 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe, ProcessId: 7092, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe, ProcessId: 7092, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe, ProcessId: 7092, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe, ProcessId: 7092, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "1f8684ca-0835-4252-89d1-4a2b1be1", "Group": "boy of john", "Domain1": "boyhome5100.duckdns.org", "Domain2": "boyhome5100.duckdns.org", "Port": 5100, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Antivirus detection for URL or domainShow sources
        Source: boyhome5100.duckdns.orgAvira URL Cloud: Label: malware
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeReversingLabs: Detection: 42%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTR
        Source: 16.0.chmac.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.0.chmac.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.2.chmac.exe.4830000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.2.chmac.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30f0000.6.unpackAvira: Label: TR/Patched.Ren.Gen
        Source: 16.0.chmac.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.1.chmac.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.2.chmac.exe.2500000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.1.chmac.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.0.chmac.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.2.chmac.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.0.chmac.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.0.chmac.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.0.chmac.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.0.chmac.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Detected unpacking (creates a PE file in dynamic memory)Show sources
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeUnpacked PE file: 14.2.chmac.exe.4830000.9.unpack
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeUnpacked PE file: 16.2.chmac.exe.2500000.4.unpack
        Source: G2M8C76V_INV0ICE_RECEIPT.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: wntdll.pdbUGP source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293275271.0000000003380000.00000004.00000001.sdmp, G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293559055.0000000003510000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312413916.00000000031E0000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312089409.0000000003050000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.334018187.0000000003130000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.332132170.00000000032C0000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293275271.0000000003380000.00000004.00000001.sdmp, G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293559055.0000000003510000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312413916.00000000031E0000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312089409.0000000003050000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.334018187.0000000003130000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.332132170.00000000032C0000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00402630 FindFirstFileA,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_00402630 FindFirstFileA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_00402630 FindFirstFileA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_00404A29 FindFirstFileExW,

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: boyhome5100.duckdns.org
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: boyhome5100.duckdns.org
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: Joe Sandbox ViewIP Address: 194.5.98.28 194.5.98.28
        Source: global trafficTCP traffic: 192.168.2.3:49743 -> 194.5.98.28:5100
        Source: chmac.exe, chmac.exe, 0000000F.00000000.324531335.0000000000409000.00000008.00020000.sdmp, chmac.exe, 0000000F.00000002.343203428.0000000000409000.00000004.00020000.sdmp, chmac.exe, 00000010.00000000.330014937.0000000000409000.00000008.00020000.sdmp, G2M8C76V_INV0ICE_RECEIPT.exe, chmac.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: G2M8C76V_INV0ICE_RECEIPT.exe, chmac.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: unknownDNS traffic detected: queries for: boyhome5100.duckdns.org
        Source: chmac.exe, 0000000D.00000002.326522956.00000000007CA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: chmac.exe, 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 16.2.chmac.exe.2906888.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.2756888.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.359549562.00000000028EE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.341227508.000000000273E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: G2M8C76V_INV0ICE_RECEIPT.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 16.2.chmac.exe.2906888.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.2906888.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.2756888.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.2756888.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.359549562.00000000028EE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.341227508.000000000273E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_0040604C
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00404772
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_0040A2A5
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_0040604C
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_00404772
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_0040A2A5
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_04882FA8
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_048823A0
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_04883850
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_0488238F
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_0488306F
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_0040A2A5
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_0040604C
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_00404772
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_0040A2A5
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_02573850
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_025723A0
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_02572FA8
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_0257306F
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_0040A2A5
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: String function: 00401ED0 appears 92 times
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: String function: 004056B5 appears 32 times
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: String function: 004029E8 appears 48 times
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: String function: 0040569E appears 72 times
        Source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.285266172.0000000003496000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs G2M8C76V_INV0ICE_RECEIPT.exe
        Source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.284604763.000000000362F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs G2M8C76V_INV0ICE_RECEIPT.exe
        Source: G2M8C76V_INV0ICE_RECEIPT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: chmac.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile read: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeJump to behavior
        Source: G2M8C76V_INV0ICE_RECEIPT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe "C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe"
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess created: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe "C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe"
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess created: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe "C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe"
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile created: C:\Users\user\AppData\Roaming\dihswJump to behavior
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile created: C:\Users\user\AppData\Local\Temp\nsyC82.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/12@19/2
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{1f8684ca-0835-4252-89d1-4a2b1be1a69a}
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: wntdll.pdbUGP source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293275271.0000000003380000.00000004.00000001.sdmp, G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293559055.0000000003510000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312413916.00000000031E0000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312089409.0000000003050000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.334018187.0000000003130000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.332132170.00000000032C0000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293275271.0000000003380000.00000004.00000001.sdmp, G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000003.293559055.0000000003510000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312413916.00000000031E0000.00000004.00000001.sdmp, chmac.exe, 0000000D.00000003.312089409.0000000003050000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.334018187.0000000003130000.00000004.00000001.sdmp, chmac.exe, 0000000F.00000003.332132170.00000000032C0000.00000004.00000001.sdmp

        Data Obfuscation:

        barindex
        Detected unpacking (creates a PE file in dynamic memory)Show sources
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeUnpacked PE file: 14.2.chmac.exe.4830000.9.unpack
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeUnpacked PE file: 16.2.chmac.exe.2500000.4.unpack
        .NET source code contains potential unpackerShow sources
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_738D1000 push eax; ret
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_72EE1000 push eax; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00632881 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00632570 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00632DFD push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_006325C5 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00632E75 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_006326E4 push eax; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_006326A8 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00632E81 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00632685 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00401F16 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A52881 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A52DFD push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A525D0 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A525DD push eax; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A52570 push ecx; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A526A8 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A52E81 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00A52E75 push edi; ret
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_00401F16 push ecx; ret
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 14.2.chmac.exe.4830000.9.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 16.2.chmac.exe.2500000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile created: C:\Users\user\AppData\Local\Temp\nsiCC2.tmp\esrskf.dllJump to dropped file
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile created: C:\Users\user\AppData\Roaming\dihsw\chmac.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeFile created: C:\Users\user\AppData\Local\Temp\nsq5FC4.tmp\esrskf.dllJump to dropped file
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeFile created: C:\Users\user\AppData\Local\Temp\nsx3DC5.tmp\esrskf.dllJump to dropped file
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kyvrnrwlJump to behavior
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kyvrnrwlJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeFile opened: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe TID: 5352Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe TID: 5356Thread sleep time: -32000s >= -30000s
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe TID: 4200Thread sleep time: -280000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exe TID: 6304Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exe TID: 6568Thread sleep count: 42 > 30
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exe TID: 6808Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exe TID: 6764Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exe TID: 2884Thread sleep count: 37 > 30
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exe TID: 5904Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeWindow / User API: foregroundWindowGot 939
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeAPI coverage: 6.8 %
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00402630 FindFirstFileA,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_00402630 FindFirstFileA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_00405D7C FindFirstFileA,FindClose,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_00402630 FindFirstFileA,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00404A29 FindFirstFileExW,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_00404A29 FindFirstFileExW,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeThread delayed: delay time: 30000
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_004067FE GetProcessHeap,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_0019DE9A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_0019E19E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_0019E0AE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_0019E1DC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_0019E15F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_0019DE9A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_0019E19E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_0019E0AE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_0019E1DC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 13_2_0019E15F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_0019E15F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_0019DE9A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_0019E19E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_0019E0AE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 15_2_0019E1DC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_004035F1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 14_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_00401E1D SetUnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeCode function: 16_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeMemory written: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeMemory written: C:\Users\user\AppData\Roaming\dihsw\chmac.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeMemory written: C:\Users\user\AppData\Roaming\dihsw\chmac.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeProcess created: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe "C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe"
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\AppData\Roaming\dihsw\chmac.exeProcess created: C:\Users\user\AppData\Roaming\dihsw\chmac.exe "C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_0040208D cpuid
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 3_1_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
        Source: C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: G2M8C76V_INV0ICE_RECEIPT.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: G2M8C76V_INV0ICE_RECEIPT.exe, 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: chmac.exe, 0000000E.00000002.341227508.000000000273E000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 0000000E.00000002.341227508.000000000273E000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: chmac.exe, 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exeString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000002.359549562.00000000028EE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000002.359549562.00000000028EE000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: chmac.exe, 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: chmac.exe, 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: chmac.exe, 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.4830000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.658288.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.1.chmac.exe.415058.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.415058.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37ac01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30b1458.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3011458.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b547d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.chmac.exe.3000000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.50a9b8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.3960e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30a0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.2260000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.2500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.24b0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2551458.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.395c01e.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.37b0e54.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.3733258.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.415058.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.396547d.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.38e3258.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.1.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.chmac.exe.400000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.415058.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.415058.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.chmac.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.0.chmac.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.0.chmac.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.chmac.exe.2540000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 6964, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: G2M8C76V_INV0ICE_RECEIPT.exe PID: 7092, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6288, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6556, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6760, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: chmac.exe PID: 6820, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsNative API1Registry Run Keys / Startup Folder1Process Injection111Disable or Modify Tools1Input Capture21System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information11LSASS MemoryFile and Directory Discovery2Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery15SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing21NTDSSecurity Software Discovery12Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsVirtualization/Sandbox Evasion21VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection111DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 552628 Sample: G2M8C76V_INV0ICE_RECEIPT.exe Startdate: 13/01/2022 Architecture: WINDOWS Score: 100 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 6 other signatures 2->47 6 G2M8C76V_INV0ICE_RECEIPT.exe 1 21 2->6         started        10 chmac.exe 17 2->10         started        12 chmac.exe 17 2->12         started        process3 file4 23 C:\Users\user\AppData\Roaming\...\chmac.exe, PE32 6->23 dropped 25 C:\Users\user\AppData\Local\...\esrskf.dll, PE32 6->25 dropped 49 Injects a PE file into a foreign processes 6->49 14 G2M8C76V_INV0ICE_RECEIPT.exe 9 6->14         started        27 C:\Users\user\AppData\Local\...\esrskf.dll, PE32 10->27 dropped 51 Multi AV Scanner detection for dropped file 10->51 53 Detected unpacking (creates a PE file in dynamic memory) 10->53 19 chmac.exe 3 10->19         started        29 C:\Users\user\AppData\Local\...\esrskf.dll, PE32 12->29 dropped 21 chmac.exe 2 12->21         started        signatures5 process6 dnsIp7 35 boyhome5100.duckdns.org 194.5.98.28, 49743, 49744, 49745 DANILENKODE Netherlands 14->35 37 192.168.2.1 unknown unknown 14->37 31 C:\Users\user\AppData\Roaming\...\run.dat, International 14->31 dropped 39 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->39 33 C:\Users\user\AppData\Local\...\chmac.exe.log, ASCII 19->33 dropped file8 signatures9

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\dihsw\chmac.exe42%ReversingLabsWin32.Backdoor.NanoBot

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        16.0.chmac.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.0.chmac.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.2.chmac.exe.4830000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.2.chmac.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        0.2.G2M8C76V_INV0ICE_RECEIPT.exe.30f0000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
        16.0.chmac.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.1.chmac.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.1.G2M8C76V_INV0ICE_RECEIPT.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.2.chmac.exe.2500000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.1.chmac.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.0.chmac.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.2.chmac.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        3.0.G2M8C76V_INV0ICE_RECEIPT.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.0.chmac.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.0.chmac.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.0.chmac.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.0.chmac.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        SourceDetectionScannerLabelLink
        boyhome5100.duckdns.org2%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        boyhome5100.duckdns.org2%VirustotalBrowse
        boyhome5100.duckdns.org100%Avira URL Cloudmalware

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        boyhome5100.duckdns.org
        194.5.98.28
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        boyhome5100.duckdns.orgtrue
        • 2%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_Errorchmac.exe, chmac.exe, 0000000F.00000000.324531335.0000000000409000.00000008.00020000.sdmp, chmac.exe, 0000000F.00000002.343203428.0000000000409000.00000004.00020000.sdmp, chmac.exe, 00000010.00000000.330014937.0000000000409000.00000008.00020000.sdmp, G2M8C76V_INV0ICE_RECEIPT.exe, chmac.exe.0.drfalse
          high
          http://nsis.sf.net/NSIS_ErrorErrorG2M8C76V_INV0ICE_RECEIPT.exe, chmac.exe.0.drfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            194.5.98.28
            boyhome5100.duckdns.orgNetherlands
            208476DANILENKODEtrue

            Private

            IP
            192.168.2.1

            General Information

            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:552628
            Start date:13.01.2022
            Start time:15:31:20
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 11m 14s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:G2M8C76V_INV0ICE_RECEIPT.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:29
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@9/12@19/2
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 70.6% (good quality ratio 65.6%)
            • Quality average: 78.3%
            • Quality standard deviation: 30.4%
            HCA Information:
            • Successful, ratio: 88%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.6.115
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            15:32:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kyvrnrwl C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            15:32:22API Interceptor959x Sleep call for process: G2M8C76V_INV0ICE_RECEIPT.exe modified
            15:32:25AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kyvrnrwl C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            15:32:27API Interceptor2x Sleep call for process: chmac.exe modified

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chmac.exe.log
            Process:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.2874233355119316
            Encrypted:false
            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
            MD5:61CCF53571C9ABA6511D696CB0D32E45
            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
            Malicious:true
            Reputation:high, very likely benign file
            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
            C:\Users\user\AppData\Local\Temp\56mc2ilzkdt85ppfm
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:data
            Category:dropped
            Size (bytes):278527
            Entropy (8bit):7.984440804169609
            Encrypted:false
            SSDEEP:6144:ANMYeemSX268bMvy0lOGYLjTDNe4bKtB5u85S1wJLYoAlwYJuDNW:AqYeyX6Yq0lPYXNdb0Hw1wJLYoAlLgW
            MD5:E2674E39313EB905BEDB38EE4A90EB82
            SHA1:7EC20D0AD4E70C7621B7D0D836CA7C22029B8A9E
            SHA-256:91CBC859051888ECD50E3765A1A0AE9280DBD540A32A272D6D153F969CEA606D
            SHA-512:FA36A87ED16623BC62B76663F2DFAB3097DA69107CB091BD3BD4C677415F09E5CAF329F06FB566CF8A29CBDE7E50CCACDDFBE44BC125532BF0D9F6AF9D0BC52B
            Malicious:false
            Reputation:low
            Preview: ...np.y6k.x..@.........M...v...,M.6.'..X..._...1v.,l.....8.Z6..H.2B.?.K..<.Lp.,h.].PYEG.t.BlU...Z.7.F....%.#..z..Z.3............`P...?.R)......0.....$|.tW`../.ugo..<.c]}D.nT)...0&.i..............v. {...g...S.X2;v....r`.7...P-.3Rq8.......S..?. ..p.y...x.vc.........|.M.}..o,..,M.6.'L.X..._[..1v.,l.\.. .VZ.{|....t...B.?.H.....M.&M_F..I^Q.{..#....k.r0...G!...Ba.3......6.D=...B.lX...8.Ob.A...q=....Cw....Z...."fR"..l..V...@....*;qe.P2..`...B.!..s..L..Q?`..R...Ki.SH..=D$..r....2a}M...X......S..v...p.yg,.x?.@........|.M...v...,..6....;.._t..1vs,l.... I.Z..{|.o..P....?Fa9wj.M....F...^QI{...a...X.r....GG..TBD...k(...P.D=...bR.X..L8........q=..<.C...P.]...CA?R"U.l..d.......*;qe.P2..b..dB.!..s.......?`..R...Ki.SB....$..r....2a}M...X......S..?. ..p.y.k.x?2@........|.M...v...,M.6.'..X..._...1v.,l.... ..Z..{|.o..P...B.?...U...M.&..F.zI^Q.{..#....X.r....GG..TBa.3......6.D=...bb.X...8........q=....Cw....Z...."fR"..l.j...@....*;qe.P2..`...B.!..s.......?`..R...Ki.SB....$.
            C:\Users\user\AppData\Local\Temp\nfjvhlc
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:data
            Category:dropped
            Size (bytes):7448
            Entropy (8bit):6.084978183064926
            Encrypted:false
            SSDEEP:192:efAApVIRgy4M0Ag13vj/O7s7Pb/T8MEAGLVrW1nU8sj:kqb0bF/NPbAMKLVrMnUv
            MD5:812162B475D941A12A193D8C085597E6
            SHA1:9B4B7CD34860F8FA19B0B5154DBB7F69CFC99489
            SHA-256:C89928AC7C6B93AB283B1197CA645AF22DC77FBFA5E066EDEEAE3402A952ED47
            SHA-512:BFAB4487C5434108FC063A6FCE997543B720F179674C32366910A25DB366FC41179A5492719288C2ABBB2677C510FFD41EDE53B98ED2F44155B8DA50FBE33722
            Malicious:false
            Reputation:low
            Preview: ;,....i...........T....4.T....<....]................g...<......,..8......g...<<.....$..0......g...<1.....\..(......g...<V.....T..`... .....T!!..k..4..@i..< .[..<...i.<i..g S.2....i.<!..g b.........@...<..... ..)....,...$...\...T...4...<......i..............,.i.......!..<....].. ..... ..)i....i.....i?.b...i....T.....i..i.....i..i.i..i.S...i.S ...i..i..i....i..i..i?.b.....^.<."..<."..b.....5.<."..<."..b....y.<."..<."..b...i.....T....<]......g.,.........i..^..i.....i......@<.....T..i..k....[....,...8g.<k...S3....,...8."....T.g..,....5.<#....<&........g.<....<...................]......i..i?.b ..i.....T....<]......g.T.........i..^..i.....i......@<. ...T.j...i..k....[....T...`i..k...S3....T...`i..k...#3...T...`i...[....2!...T...`g.<k...S3"...T...`......T.g..T....^.<>....<A............i.<i....................<...................]......i..i?.b...i....]......g.@.........i..^..i.....i......@<.!...T..i..k....[....@...<i..k...S3....@...<."....T.g..@...y.<.....<...........
            C:\Users\user\AppData\Local\Temp\nsiCC1.tmp
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:data
            Category:dropped
            Size (bytes):317856
            Entropy (8bit):7.76643048605343
            Encrypted:false
            SSDEEP:6144:2jCLNMYeemSX268bMvy0lOGYLjTDNe4bKtB5u85S1wJLYoAlwYJuDN:2eqYeyX6Yq0lPYXNdb0Hw1wJLYoAlLg
            MD5:C2D44B063B4B0AABF482FFB2E1074145
            SHA1:F5EFA683BD7E7FCDF848C26F8E8A81D9DDA9CFE6
            SHA-256:0994AF1254D390C551AD60759AF35F2267CB7324182C2087772D51D89DB9C004
            SHA-512:BB831F963B4213E5B23403141261BE8C8C68EBEFE087EE66B4C5783A343FE93DB8A081CCC7AEF6998861371D51FFE4B9FFEB39A3AAC53FAC8C5C9D14F94FC795
            Malicious:false
            Reputation:low
            Preview: yj......,...................a....P.......i......aj..........................................................................................................................................................................................................................................J...................j........................................................................................................................................... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\nsiCC2.tmp\esrskf.dll
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):4608
            Entropy (8bit):3.7711135978980614
            Encrypted:false
            SSDEEP:24:e31GSNNN0teIAJdax/+YZVy0NVxagHCueecv8hueeYoNXs+f3SlLRQ0K7ABPnRug:CnaI9ro3ngnFbfGFN1RuqSR
            MD5:CA6B2E72403972AE585025A81040FC44
            SHA1:BDA160D06EE5611B6CFE53F048CC00526941A1D4
            SHA-256:E0932A5438FFEE964EF9DEB10C5C5F187B12B319894552BA062A36E93EABBBF8
            SHA-512:48283C382D8C95DC96E193EAE541F6E86FFA43D107D0F739F1FFEA779364EFC0562A094C167F65ADCFD97B37BA6A31F561E237E92601F908AD7AAC87FF56B2ED
            Malicious:false
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z-...C]..C]..C]Z.M]..C].}B\..C]..B]..C].nG\..C].nC\..C].n.]..C].nA\..C]Rich..C]........................PE..L....0.a...........!......................... ...............................P............@.......................... ..H.... .......0.......................@..<.................................................... ...............................text...B........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@.reloc..<....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\nsq5FC3.tmp
            Process:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            File Type:data
            Category:dropped
            Size (bytes):317856
            Entropy (8bit):7.76643048605343
            Encrypted:false
            SSDEEP:6144:2jCLNMYeemSX268bMvy0lOGYLjTDNe4bKtB5u85S1wJLYoAlwYJuDN:2eqYeyX6Yq0lPYXNdb0Hw1wJLYoAlLg
            MD5:C2D44B063B4B0AABF482FFB2E1074145
            SHA1:F5EFA683BD7E7FCDF848C26F8E8A81D9DDA9CFE6
            SHA-256:0994AF1254D390C551AD60759AF35F2267CB7324182C2087772D51D89DB9C004
            SHA-512:BB831F963B4213E5B23403141261BE8C8C68EBEFE087EE66B4C5783A343FE93DB8A081CCC7AEF6998861371D51FFE4B9FFEB39A3AAC53FAC8C5C9D14F94FC795
            Malicious:false
            Reputation:low
            Preview: yj......,...................a....P.......i......aj..........................................................................................................................................................................................................................................J...................j........................................................................................................................................... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\nsq5FC4.tmp\esrskf.dll
            Process:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):4608
            Entropy (8bit):3.7711135978980614
            Encrypted:false
            SSDEEP:24:e31GSNNN0teIAJdax/+YZVy0NVxagHCueecv8hueeYoNXs+f3SlLRQ0K7ABPnRug:CnaI9ro3ngnFbfGFN1RuqSR
            MD5:CA6B2E72403972AE585025A81040FC44
            SHA1:BDA160D06EE5611B6CFE53F048CC00526941A1D4
            SHA-256:E0932A5438FFEE964EF9DEB10C5C5F187B12B319894552BA062A36E93EABBBF8
            SHA-512:48283C382D8C95DC96E193EAE541F6E86FFA43D107D0F739F1FFEA779364EFC0562A094C167F65ADCFD97B37BA6A31F561E237E92601F908AD7AAC87FF56B2ED
            Malicious:false
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z-...C]..C]..C]Z.M]..C].}B\..C]..B]..C].nG\..C].nC\..C].n.]..C].nA\..C]Rich..C]........................PE..L....0.a...........!......................... ...............................P............@.......................... ..H.... .......0.......................@..<.................................................... ...............................text...B........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@.reloc..<....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\nsx3DC4.tmp
            Process:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            File Type:data
            Category:dropped
            Size (bytes):317856
            Entropy (8bit):7.76643048605343
            Encrypted:false
            SSDEEP:6144:2jCLNMYeemSX268bMvy0lOGYLjTDNe4bKtB5u85S1wJLYoAlwYJuDN:2eqYeyX6Yq0lPYXNdb0Hw1wJLYoAlLg
            MD5:C2D44B063B4B0AABF482FFB2E1074145
            SHA1:F5EFA683BD7E7FCDF848C26F8E8A81D9DDA9CFE6
            SHA-256:0994AF1254D390C551AD60759AF35F2267CB7324182C2087772D51D89DB9C004
            SHA-512:BB831F963B4213E5B23403141261BE8C8C68EBEFE087EE66B4C5783A343FE93DB8A081CCC7AEF6998861371D51FFE4B9FFEB39A3AAC53FAC8C5C9D14F94FC795
            Malicious:false
            Reputation:low
            Preview: yj......,...................a....P.......i......aj..........................................................................................................................................................................................................................................J...................j........................................................................................................................................... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\nsx3DC5.tmp\esrskf.dll
            Process:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):4608
            Entropy (8bit):3.7711135978980614
            Encrypted:false
            SSDEEP:24:e31GSNNN0teIAJdax/+YZVy0NVxagHCueecv8hueeYoNXs+f3SlLRQ0K7ABPnRug:CnaI9ro3ngnFbfGFN1RuqSR
            MD5:CA6B2E72403972AE585025A81040FC44
            SHA1:BDA160D06EE5611B6CFE53F048CC00526941A1D4
            SHA-256:E0932A5438FFEE964EF9DEB10C5C5F187B12B319894552BA062A36E93EABBBF8
            SHA-512:48283C382D8C95DC96E193EAE541F6E86FFA43D107D0F739F1FFEA779364EFC0562A094C167F65ADCFD97B37BA6A31F561E237E92601F908AD7AAC87FF56B2ED
            Malicious:false
            Reputation:low
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z-...C]..C]..C]Z.M]..C].}B\..C]..B]..C].nG\..C].nC\..C].n.]..C].nA\..C]Rich..C]........................PE..L....0.a...........!......................... ...............................P............@.......................... ..H.... .......0.......................@..<.................................................... ...............................text...B........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@.reloc..<....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:data
            Category:dropped
            Size (bytes):232
            Entropy (8bit):7.089541637477408
            Encrypted:false
            SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
            MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
            SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
            SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
            SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:International EBCDIC text, with no line terminators, with overstriking
            Category:dropped
            Size (bytes):8
            Entropy (8bit):3.0
            Encrypted:false
            SSDEEP:3:JX98:o
            MD5:96A85767F76F3E5FC753A622A56C5315
            SHA1:67832A8FDABC53BB4AF9DFEB37705D62A32559A5
            SHA-256:8AE24E6F0625954103BC1DE425F96A077410B995891E73E706600B3F3F7B23AC
            SHA-512:E3161717A96BE7C5DC13440E44DF7F4791C53496D20939026689BE160AA04EFF916C08E3F91363158FCC874AD527A18D046A68E3AD2F4FE8DEC9604A155F38EE
            Malicious:true
            Preview: ..`....H
            C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            Process:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
            Category:dropped
            Size (bytes):663115
            Entropy (8bit):5.508570188450402
            Encrypted:false
            SSDEEP:6144:lwq9sUW6UzgZb6uxaKHEMiYKpgss9N2zy:6UZYgxc5NYKCr7
            MD5:D272E884F59FF9D7921619F88766709D
            SHA1:B9013DCFFC28E174C1CB7D81FD46B6463B4FF579
            SHA-256:94A00E5D13EEBC1A99DD48E2D9F9CB48935C424C6BD58AB9F6D78FF0CAA36506
            SHA-512:EB8A351EB547A359F246B6E82B4794AEF31E2A350043116965E636A7A69583621C1EE2A5381079A1815A7489BFADC2FC3962AE74CBDF523A4F6E6E7E2379D9C2
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 42%
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.......p....@..........................p...............................................s.......................................................................................p...............................text...vY.......Z.................. ..`.rdata.......p.......^..............@..@.data................p..............@....ndata.......@...........................rsrc................t..............@..@........................................................................................................................................................................................................................................................................................................................................................

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
            Entropy (8bit):5.508570188450402
            TrID:
            • Win32 Executable (generic) a (10002005/4) 92.16%
            • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:G2M8C76V_INV0ICE_RECEIPT.exe
            File size:663115
            MD5:d272e884f59ff9d7921619f88766709d
            SHA1:b9013dcffc28e174c1cb7d81fd46b6463b4ff579
            SHA256:94a00e5d13eebc1a99dd48e2d9f9cb48935c424c6bd58ab9f6d78ff0caa36506
            SHA512:eb8a351eb547a359f246b6e82b4794aef31e2a350043116965e636a7a69583621c1ee2a5381079a1815a7489bfadc2fc3962ae74cbdf523a4f6e6e7e2379d9c2
            SSDEEP:6144:lwq9sUW6UzgZb6uxaKHEMiYKpgss9N2zy:6UZYgxc5NYKCr7
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

            File Icon

            Icon Hash:d8c8d0d0f0ccd4d0

            Static PE Info

            General

            Entrypoint:0x403225
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:099c0646ea7282d232219f8807883be0

            Entrypoint Preview

            Instruction
            sub esp, 00000180h
            push ebx
            push ebp
            push esi
            xor ebx, ebx
            push edi
            mov dword ptr [esp+18h], ebx
            mov dword ptr [esp+10h], 00409128h
            xor esi, esi
            mov byte ptr [esp+14h], 00000020h
            call dword ptr [00407030h]
            push 00008001h
            call dword ptr [004070B4h]
            push ebx
            call dword ptr [0040727Ch]
            push 00000008h
            mov dword ptr [00423F58h], eax
            call 00007F38E8C8C460h
            mov dword ptr [00423EA4h], eax
            push ebx
            lea eax, dword ptr [esp+34h]
            push 00000160h
            push eax
            push ebx
            push 0041F450h
            call dword ptr [00407158h]
            push 004091B0h
            push 004236A0h
            call 00007F38E8C8C117h
            call dword ptr [004070B0h]
            mov edi, 00429000h
            push eax
            push edi
            call 00007F38E8C8C105h
            push ebx
            call dword ptr [0040710Ch]
            cmp byte ptr [00429000h], 00000022h
            mov dword ptr [00423EA0h], eax
            mov eax, edi
            jne 00007F38E8C8992Ch
            mov byte ptr [esp+14h], 00000022h
            mov eax, 00429001h
            push dword ptr [esp+14h]
            push eax
            call 00007F38E8C8BBF8h
            push eax
            call dword ptr [0040721Ch]
            mov dword ptr [esp+1Ch], eax
            jmp 00007F38E8C89985h
            cmp cl, 00000020h
            jne 00007F38E8C89928h
            inc eax
            cmp byte ptr [eax], 00000020h
            je 00007F38E8C8991Ch
            cmp byte ptr [eax], 00000022h
            mov byte ptr [eax+eax+00h], 00000000h

            Rich Headers

            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x5ac80.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x2c0000x5ac800x5ae00False0.0282652381362data2.14570825877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x2c2800x42028dBase III DBT, version number 0, next free block index 40EnglishUnited States
            RT_ICON0x6e2a80x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
            RT_ICON0x7ead00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0EnglishUnited States
            RT_ICON0x82cf80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0EnglishUnited States
            RT_ICON0x852a00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0EnglishUnited States
            RT_ICON0x863480x468GLS_BINARY_LSB_FIRSTEnglishUnited States
            RT_DIALOG0x867b00x100dataEnglishUnited States
            RT_DIALOG0x868b00x11cdataEnglishUnited States
            RT_DIALOG0x869d00x60dataEnglishUnited States
            RT_GROUP_ICON0x86a300x5adataEnglishUnited States
            RT_MANIFEST0x86a900x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

            Imports

            DLLImport
            KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
            USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
            GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
            SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
            ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
            COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
            ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
            VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            Snort IDS Alerts

            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            01/13/22-15:32:22.405814UDP254DNS SPOOF query response with TTL of 1 min. and no authority53578758.8.8.8192.168.2.3
            01/13/22-15:32:35.830669UDP254DNS SPOOF query response with TTL of 1 min. and no authority53528068.8.8.8192.168.2.3
            01/13/22-15:32:48.402158UDP254DNS SPOOF query response with TTL of 1 min. and no authority53607848.8.8.8192.168.2.3
            01/13/22-15:32:54.892461UDP254DNS SPOOF query response with TTL of 1 min. and no authority53511438.8.8.8192.168.2.3
            01/13/22-15:33:01.332628UDP254DNS SPOOF query response with TTL of 1 min. and no authority53560098.8.8.8192.168.2.3
            01/13/22-15:33:07.691280UDP254DNS SPOOF query response with TTL of 1 min. and no authority53551028.8.8.8192.168.2.3
            01/13/22-15:33:13.938372UDP254DNS SPOOF query response with TTL of 1 min. and no authority53495598.8.8.8192.168.2.3
            01/13/22-15:33:27.058039UDP254DNS SPOOF query response with TTL of 1 min. and no authority53603528.8.8.8192.168.2.3
            01/13/22-15:33:47.081904UDP254DNS SPOOF query response with TTL of 1 min. and no authority53643678.8.8.8192.168.2.3
            01/13/22-15:34:12.542040UDP254DNS SPOOF query response with TTL of 1 min. and no authority53634568.8.8.8192.168.2.3
            01/13/22-15:34:18.907708UDP254DNS SPOOF query response with TTL of 1 min. and no authority53585408.8.8.8192.168.2.3

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jan 13, 2022 15:32:22.421966076 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:22.638089895 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:22.638262987 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:22.681634903 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:22.927839994 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:22.928119898 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.202478886 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.204865932 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.422007084 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.422168016 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.688400984 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.688625097 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.953144073 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.953242064 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.974941015 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.975009918 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.975030899 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.975071907 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.975084066 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.975142002 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:23.975311995 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:23.975361109 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.195730925 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.195770025 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.195786953 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.195801973 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.195871115 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.195933104 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.197261095 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.197288990 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.197380066 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.197438955 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.197463989 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.197529078 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412081003 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412120104 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412270069 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412296057 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412353992 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412378073 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412425995 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412484884 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412549973 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412600994 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412719011 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412767887 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412918091 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412942886 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.412969112 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.412988901 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.413502932 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.413558960 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.413671970 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.413722038 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.413892031 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.413948059 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.415338993 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.415370941 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.415414095 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.415436029 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.415725946 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.415752888 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.415776968 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.415795088 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.416074038 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.416125059 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.497258902 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.628937960 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.629045010 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.629529953 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.629594088 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.630927086 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.630968094 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631002903 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631011009 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631057024 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631068945 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631100893 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631103992 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631145000 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631146908 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631190062 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631191015 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631226063 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631232977 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631272078 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631275892 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631309986 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631315947 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631356955 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631359100 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631392956 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631400108 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631441116 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631443024 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631479979 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631480932 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631520033 CET510049743194.5.98.28192.168.2.3
            Jan 13, 2022 15:32:24.631522894 CET497435100192.168.2.3194.5.98.28
            Jan 13, 2022 15:32:24.631560087 CET497435100192.168.2.3194.5.98.28

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jan 13, 2022 15:32:22.209491968 CET5787553192.168.2.38.8.8.8
            Jan 13, 2022 15:32:22.405813932 CET53578758.8.8.8192.168.2.3
            Jan 13, 2022 15:32:28.565608978 CET5415453192.168.2.38.8.8.8
            Jan 13, 2022 15:32:28.585058928 CET53541548.8.8.8192.168.2.3
            Jan 13, 2022 15:32:35.717637062 CET5280653192.168.2.38.8.8.8
            Jan 13, 2022 15:32:35.830668926 CET53528068.8.8.8192.168.2.3
            Jan 13, 2022 15:32:41.991347075 CET6402153192.168.2.38.8.8.8
            Jan 13, 2022 15:32:42.010797024 CET53640218.8.8.8192.168.2.3
            Jan 13, 2022 15:32:48.289732933 CET6078453192.168.2.38.8.8.8
            Jan 13, 2022 15:32:48.402158022 CET53607848.8.8.8192.168.2.3
            Jan 13, 2022 15:32:54.779721975 CET5114353192.168.2.38.8.8.8
            Jan 13, 2022 15:32:54.892461061 CET53511438.8.8.8192.168.2.3
            Jan 13, 2022 15:33:01.219548941 CET5600953192.168.2.38.8.8.8
            Jan 13, 2022 15:33:01.332628012 CET53560098.8.8.8192.168.2.3
            Jan 13, 2022 15:33:07.577388048 CET5510253192.168.2.38.8.8.8
            Jan 13, 2022 15:33:07.691279888 CET53551028.8.8.8192.168.2.3
            Jan 13, 2022 15:33:13.824532986 CET4955953192.168.2.38.8.8.8
            Jan 13, 2022 15:33:13.938371897 CET53495598.8.8.8192.168.2.3
            Jan 13, 2022 15:33:20.093357086 CET5710653192.168.2.38.8.8.8
            Jan 13, 2022 15:33:20.112741947 CET53571068.8.8.8192.168.2.3
            Jan 13, 2022 15:33:26.943756104 CET6035253192.168.2.38.8.8.8
            Jan 13, 2022 15:33:27.058038950 CET53603528.8.8.8192.168.2.3
            Jan 13, 2022 15:33:33.189743996 CET6098253192.168.2.38.8.8.8
            Jan 13, 2022 15:33:33.209614038 CET53609828.8.8.8192.168.2.3
            Jan 13, 2022 15:33:39.395334959 CET5805853192.168.2.38.8.8.8
            Jan 13, 2022 15:33:39.414510965 CET53580588.8.8.8192.168.2.3
            Jan 13, 2022 15:33:46.968370914 CET6436753192.168.2.38.8.8.8
            Jan 13, 2022 15:33:47.081903934 CET53643678.8.8.8192.168.2.3
            Jan 13, 2022 15:33:53.528749943 CET5153953192.168.2.38.8.8.8
            Jan 13, 2022 15:33:53.548517942 CET53515398.8.8.8192.168.2.3
            Jan 13, 2022 15:33:59.952053070 CET5539353192.168.2.38.8.8.8
            Jan 13, 2022 15:33:59.971908092 CET53553938.8.8.8192.168.2.3
            Jan 13, 2022 15:34:06.225054026 CET5058553192.168.2.38.8.8.8
            Jan 13, 2022 15:34:06.244513035 CET53505858.8.8.8192.168.2.3
            Jan 13, 2022 15:34:12.427901983 CET6345653192.168.2.38.8.8.8
            Jan 13, 2022 15:34:12.542040110 CET53634568.8.8.8192.168.2.3
            Jan 13, 2022 15:34:18.793152094 CET5854053192.168.2.38.8.8.8
            Jan 13, 2022 15:34:18.907707930 CET53585408.8.8.8192.168.2.3

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Jan 13, 2022 15:32:22.209491968 CET192.168.2.38.8.8.80x4721Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:32:28.565608978 CET192.168.2.38.8.8.80x8feaStandard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:32:35.717637062 CET192.168.2.38.8.8.80xdecaStandard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:32:41.991347075 CET192.168.2.38.8.8.80x4167Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:32:48.289732933 CET192.168.2.38.8.8.80x4bf8Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:32:54.779721975 CET192.168.2.38.8.8.80x7c96Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:01.219548941 CET192.168.2.38.8.8.80x8b00Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:07.577388048 CET192.168.2.38.8.8.80x7c76Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:13.824532986 CET192.168.2.38.8.8.80x4c89Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:20.093357086 CET192.168.2.38.8.8.80x847Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:26.943756104 CET192.168.2.38.8.8.80x9ddcStandard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:33.189743996 CET192.168.2.38.8.8.80x2b96Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:39.395334959 CET192.168.2.38.8.8.80x5a8Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:46.968370914 CET192.168.2.38.8.8.80xff75Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:53.528749943 CET192.168.2.38.8.8.80x5d02Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:33:59.952053070 CET192.168.2.38.8.8.80x491cStandard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:34:06.225054026 CET192.168.2.38.8.8.80x779aStandard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:34:12.427901983 CET192.168.2.38.8.8.80x2f7Standard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)
            Jan 13, 2022 15:34:18.793152094 CET192.168.2.38.8.8.80x890fStandard query (0)boyhome5100.duckdns.orgA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Jan 13, 2022 15:32:22.405813932 CET8.8.8.8192.168.2.30x4721No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:32:28.585058928 CET8.8.8.8192.168.2.30x8feaNo error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:32:35.830668926 CET8.8.8.8192.168.2.30xdecaNo error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:32:42.010797024 CET8.8.8.8192.168.2.30x4167No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:32:48.402158022 CET8.8.8.8192.168.2.30x4bf8No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:32:54.892461061 CET8.8.8.8192.168.2.30x7c96No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:01.332628012 CET8.8.8.8192.168.2.30x8b00No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:07.691279888 CET8.8.8.8192.168.2.30x7c76No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:13.938371897 CET8.8.8.8192.168.2.30x4c89No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:20.112741947 CET8.8.8.8192.168.2.30x847No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:27.058038950 CET8.8.8.8192.168.2.30x9ddcNo error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:33.209614038 CET8.8.8.8192.168.2.30x2b96No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:39.414510965 CET8.8.8.8192.168.2.30x5a8No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:47.081903934 CET8.8.8.8192.168.2.30xff75No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:53.548517942 CET8.8.8.8192.168.2.30x5d02No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:33:59.971908092 CET8.8.8.8192.168.2.30x491cNo error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:34:06.244513035 CET8.8.8.8192.168.2.30x779aNo error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:34:12.542040110 CET8.8.8.8192.168.2.30x2f7No error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)
            Jan 13, 2022 15:34:18.907707930 CET8.8.8.8192.168.2.30x890fNo error (0)boyhome5100.duckdns.org194.5.98.28A (IP address)IN (0x0001)

            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:15:32:13
            Start date:13/01/2022
            Path:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe"
            Imagebase:0x400000
            File size:663115 bytes
            MD5 hash:D272E884F59FF9D7921619F88766709D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.297135620.00000000030A0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:15:32:15
            Start date:13/01/2022
            Path:C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\G2M8C76V_INV0ICE_RECEIPT.exe"
            Imagebase:0x400000
            File size:663115 bytes
            MD5 hash:D272E884F59FF9D7921619F88766709D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000001.294779978.0000000000414000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.293187290.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.294042312.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:15:32:25
            Start date:13/01/2022
            Path:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
            Imagebase:0x400000
            File size:663115 bytes
            MD5 hash:D272E884F59FF9D7921619F88766709D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.327158537.0000000003000000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Antivirus matches:
            • Detection: 42%, ReversingLabs
            Reputation:low

            General

            Start time:15:32:27
            Start date:13/01/2022
            Path:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
            Imagebase:0x400000
            File size:663115 bytes
            MD5 hash:D272E884F59FF9D7921619F88766709D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.341257135.0000000003731000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.322700795.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.323810648.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.341406619.0000000004832000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.341081024.0000000002260000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.340666322.00000000004F4000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.340553109.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.341299575.000000000376A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.341227508.000000000273E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000001.325215386.0000000000414000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:15:32:34
            Start date:13/01/2022
            Path:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
            Imagebase:0x400000
            File size:663115 bytes
            MD5 hash:D272E884F59FF9D7921619F88766709D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.344485087.0000000002540000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            General

            Start time:15:32:36
            Start date:13/01/2022
            Path:C:\Users\user\AppData\Roaming\dihsw\chmac.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\dihsw\chmac.exe"
            Imagebase:0x400000
            File size:663115 bytes
            MD5 hash:D272E884F59FF9D7921619F88766709D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:.Net C# or VB.NET
            Yara matches:
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.359331974.00000000024B0000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.358998677.0000000000644000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000000.339547057.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000001.342024233.0000000000414000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.359590843.00000000038E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000000.341018876.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.359549562.00000000028EE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.358899493.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.359622615.000000000391A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, Author: Florian Roth
            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, Author: Joe Security
            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.359413916.0000000002502000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >