Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe

Overview

General Information

Sample Name:HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
Analysis ID:798399
MD5:8c4f47a96a1f9f58ab28a2353627c153
SHA1:4e7e9f7c7d630e2406fe76ad1576d35a773e9e06
SHA256:e1cfeeaabcfa9339523fae340820f04895c7a8332b806fd4e813343516928dde
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
PE file has nameless sections
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
PE file contains section with special chars
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • dhcpmon.exe (PID: 5240 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 8C4F47A96A1F9F58AB28A2353627C153)
    • dhcpmon.exe (PID: 5168 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 8C4F47A96A1F9F58AB28A2353627C153)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "b210040d-15e5-44d6-9102-34199926", "Group": "Default", "Domain1": "servicepoint.duckdns.org", "Domain2": "", "Port": 6755, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSUSP_NET_NAME_ConfuserExDetects ConfuserEx packed fileArnim Rupp
  • 0x4d495:$name: ConfuserEx
  • 0x4cecb:$compile: AssemblyTitle
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSUSP_NET_NAME_ConfuserExDetects ConfuserEx packed fileArnim Rupp
  • 0x4d495:$name: ConfuserEx
  • 0x4cecb:$compile: AssemblyTitle
SourceRuleDescriptionAuthorStrings
00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x3e2ed:$x1: NanoCore.ClientPluginHost
  • 0x6666d:$x1: NanoCore.ClientPluginHost
  • 0x3e32a:$x2: IClientNetworkHost
  • 0x666aa:$x2: IClientNetworkHost
  • 0x41e5d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x6a1dd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x3e055:$a: NanoCore
    • 0x3e065:$a: NanoCore
    • 0x3e299:$a: NanoCore
    • 0x3e2ad:$a: NanoCore
    • 0x3e2ed:$a: NanoCore
    • 0x663d5:$a: NanoCore
    • 0x663e5:$a: NanoCore
    • 0x66619:$a: NanoCore
    • 0x6662d:$a: NanoCore
    • 0x6666d:$a: NanoCore
    • 0x3e0b4:$b: ClientPlugin
    • 0x3e2b6:$b: ClientPlugin
    • 0x3e2f6:$b: ClientPlugin
    • 0x66434:$b: ClientPlugin
    • 0x66636:$b: ClientPlugin
    • 0x66676:$b: ClientPlugin
    • 0x3e1db:$c: ProjectData
    • 0x6655b:$c: ProjectData
    • 0x3ebe2:$d: DESCrypto
    • 0x66f62:$d: DESCrypto
    • 0x465ae:$e: KeepAlive
    00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x3e2ed:$a1: NanoCore.ClientPluginHost
    • 0x6666d:$a1: NanoCore.ClientPluginHost
    • 0x3e2ad:$a2: NanoCore.ClientPlugin
    • 0x6662d:$a2: NanoCore.ClientPlugin
    • 0x40206:$b1: get_BuilderSettings
    • 0x68586:$b1: get_BuilderSettings
    • 0x3e109:$b2: ClientLoaderForm.resources
    • 0x66489:$b2: ClientLoaderForm.resources
    • 0x3f926:$b3: PluginCommand
    • 0x67ca6:$b3: PluginCommand
    • 0x3e2de:$b4: IClientAppHost
    • 0x6665e:$b4: IClientAppHost
    • 0x4875e:$b5: GetBlockHash
    • 0x70ade:$b5: GetBlockHash
    • 0x4085e:$b6: AddHostEntry
    • 0x68bde:$b6: AddHostEntry
    • 0x44551:$b7: LogClientException
    • 0x6c8d1:$b7: LogClientException
    • 0x407cb:$b8: PipeExists
    • 0x68b4b:$b8: PipeExists
    • 0x3e317:$b9: IClientLoggingHost
    00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x35756:$a: NanoCore
    • 0x3577b:$a: NanoCore
    • 0x357d4:$a: NanoCore
    • 0x4597f:$a: NanoCore
    • 0x459a5:$a: NanoCore
    • 0x45a01:$a: NanoCore
    • 0x5285f:$a: NanoCore
    • 0x528b8:$a: NanoCore
    • 0x528eb:$a: NanoCore
    • 0x52b17:$a: NanoCore
    • 0x52b93:$a: NanoCore
    • 0x531ac:$a: NanoCore
    • 0x532f5:$a: NanoCore
    • 0x537c9:$a: NanoCore
    • 0x53ab0:$a: NanoCore
    • 0x53ac7:$a: NanoCore
    • 0x5c96f:$a: NanoCore
    • 0x5c9eb:$a: NanoCore
    • 0x5f2ce:$a: NanoCore
    • 0x6489d:$a: NanoCore
    • 0x64917:$a: NanoCore
    Click to see the 22 entries
    SourceRuleDescriptionAuthorStrings
    0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe38d:$x1: NanoCore.ClientPluginHost
    • 0xe3ca:$x2: IClientNetworkHost
    • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe105:$x1: NanoCore Client.exe
    • 0xe38d:$x2: NanoCore.ClientPluginHost
    • 0xf9c6:$s1: PluginCommand
    • 0xf9ba:$s2: FileCommand
    • 0x1086b:$s3: PipeExists
    • 0x16622:$s4: PipeCreated
    • 0xe3b7:$s5: IClientLoggingHost
    0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe0f5:$x1: NanoCore Client
      • 0xe105:$x1: NanoCore Client
      • 0xe34d:$x2: NanoCore.ClientPlugin
      • 0xe38d:$x3: NanoCore.ClientPluginHost
      • 0xe342:$i1: IClientApp
      • 0xe363:$i2: IClientData
      • 0xe36f:$i3: IClientNetwork
      • 0xe37e:$i4: IClientAppHost
      • 0xe3a7:$i5: IClientDataHost
      • 0xe3b7:$i6: IClientLoggingHost
      • 0xe3ca:$i7: IClientNetworkHost
      • 0xe3dd:$i8: IClientUIHost
      • 0xe3eb:$i9: IClientNameObjectCollection
      • 0xe407:$i10: IClientReadOnlyNameObjectCollection
      • 0xe154:$s1: ClientPlugin
      • 0xe356:$s1: ClientPlugin
      • 0xe84a:$s2: EndPoint
      • 0xe853:$s3: IPAddress
      • 0xe85d:$s4: IPEndPoint
      • 0x10293:$s6: get_ClientSettings
      • 0x10837:$s7: get_Connected
      0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xe0f5:$a: NanoCore
      • 0xe105:$a: NanoCore
      • 0xe339:$a: NanoCore
      • 0xe34d:$a: NanoCore
      • 0xe38d:$a: NanoCore
      • 0xe154:$b: ClientPlugin
      • 0xe356:$b: ClientPlugin
      • 0xe396:$b: ClientPlugin
      • 0xe27b:$c: ProjectData
      • 0xec82:$d: DESCrypto
      • 0x1664e:$e: KeepAlive
      • 0x1463c:$g: LogClientMessage
      • 0x10837:$i: get_Connected
      • 0xefb8:$j: #=q
      • 0xefe8:$j: #=q
      • 0xf004:$j: #=q
      • 0xf034:$j: #=q
      • 0xf050:$j: #=q
      • 0xf06c:$j: #=q
      • 0xf09c:$j: #=q
      • 0xf0b8:$j: #=q
      Click to see the 77 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, ProcessId: 5368, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, ProcessId: 5368, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, ProcessId: 5368, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, ProcessId: 5368, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:213.152.161.85192.168.2.36755497052810290 02/04/23-04:02:37.885591
      SID:2810290
      Source Port:6755
      Destination Port:49705
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970067552816718 02/04/23-04:02:18.413039
      SID:2816718
      Source Port:49700
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971167552816766 02/04/23-04:03:22.114925
      SID:2816766
      Source Port:49711
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970867552816766 02/04/23-04:02:58.659576
      SID:2816766
      Source Port:49708
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971367552816766 02/04/23-04:03:34.873002
      SID:2816766
      Source Port:49713
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971367552816718 02/04/23-04:03:32.601666
      SID:2816718
      Source Port:49713
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971667552816766 02/04/23-04:03:58.093532
      SID:2816766
      Source Port:49716
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:213.152.161.85192.168.2.36755497122841753 02/04/23-04:03:27.123757
      SID:2841753
      Source Port:6755
      Destination Port:49712
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:213.152.161.85192.168.2.36755497032841753 02/04/23-04:02:24.159041
      SID:2841753
      Source Port:6755
      Destination Port:49703
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970567552816766 02/04/23-04:02:38.804523
      SID:2816766
      Source Port:49705
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971567552816766 02/04/23-04:03:50.787453
      SID:2816766
      Source Port:49715
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970767552816766 02/04/23-04:02:51.380389
      SID:2816766
      Source Port:49707
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970367552816766 02/04/23-04:02:24.379082
      SID:2816766
      Source Port:49703
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970967552816766 02/04/23-04:03:05.988800
      SID:2816766
      Source Port:49709
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971267552816766 02/04/23-04:03:27.448220
      SID:2816766
      Source Port:49712
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971767552816766 02/04/23-04:04:04.561310
      SID:2816766
      Source Port:49717
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:213.152.161.85192.168.2.36755497112841753 02/04/23-04:03:22.044641
      SID:2841753
      Source Port:6755
      Destination Port:49711
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970067552816766 02/04/23-04:02:19.457207
      SID:2816766
      Source Port:49700
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970667552816766 02/04/23-04:02:45.198697
      SID:2816766
      Source Port:49706
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971467552816766 02/04/23-04:03:42.744453
      SID:2816766
      Source Port:49714
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854970467552816766 02/04/23-04:02:30.984485
      SID:2816766
      Source Port:49704
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.3213.152.161.854971067552816766 02/04/23-04:03:16.374407
      SID:2816766
      Source Port:49710
      Destination Port:6755
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeReversingLabs: Detection: 44%
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeVirustotal: Detection: 56%Perma Link
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeAvira: detected
      Source: servicepoint.duckdns.orgAvira URL Cloud: Label: malware
      Source: servicepoint.duckdns.orgVirustotal: Detection: 11%Perma Link
      Source: servicepoint.duckdns.orgVirustotal: Detection: 11%Perma Link
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: HEUR/AGEN.1202424
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 44%
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeVirustotal: Detection: 56%Perma Link
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTR
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeJoe Sandbox ML: detected
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "b210040d-15e5-44d6-9102-34199926", "Group": "Default", "Domain1": "servicepoint.duckdns.org", "Domain2": "", "Port": 6755, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp

      Networking

      barindex
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49700 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49700 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49703 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.161.85:6755 -> 192.168.2.3:49703
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49704 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49705 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 213.152.161.85:6755 -> 192.168.2.3:49705
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49706 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49707 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49708 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49709 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49710 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49711 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.161.85:6755 -> 192.168.2.3:49711
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.161.85:6755 -> 192.168.2.3:49712
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49712 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49713 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49713 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49714 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49715 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49716 -> 213.152.161.85:6755
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49717 -> 213.152.161.85:6755
      Source: Malware configuration extractorURLs:
      Source: Malware configuration extractorURLs: servicepoint.duckdns.org
      Source: unknownDNS query: name: servicepoint.duckdns.org
      Source: Joe Sandbox ViewASN Name: GLOBALLAYERNL GLOBALLAYERNL
      Source: Joe Sandbox ViewIP Address: 213.152.161.85 213.152.161.85
      Source: global trafficTCP traffic: 192.168.2.3:49700 -> 213.152.161.85:6755
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
      Source: unknownDNS traffic detected: queries for: servicepoint.duckdns.org

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTR

      System Summary

      barindex
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000001.00000002.516146416.0000000003751000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: section name:
      Source: dhcpmon.exe.1.drStatic PE information: section name:
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: section name: 4SUP}s
      Source: dhcpmon.exe.1.drStatic PE information: section name: 4SUP}s
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, type: SAMPLEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.0.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37617ac.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37f4434.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37dfe00.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.37d3bc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000001.00000002.516146416.0000000003751000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04951C20
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049515E9
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950E00
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950A58
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04951C11
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04951005
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_0495080A
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04951052
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_0495084C
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950463
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950592
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_0495018E
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950DD1
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_0495015E
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950565
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049506A8
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049502D4
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049502C2
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049506E0
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950231
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_0495023C
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04950388
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049507A7
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049507D5
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_049503F0
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04A173F6
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A2FA8
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A23A0
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A8798
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033AAE38
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A3850
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A9398
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A306F
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A945F
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 1_2_033A9C40
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960A58
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960E00
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02961C20
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029602D4
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029602C2
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960231
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_0296023C
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960388
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029603F0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02961005
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_0296080A
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02961052
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_0296084C
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_0296018E
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_0296015E
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029606A8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029606E0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029607A7
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_029607D5
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960C40
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960463
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960592
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_02960565
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_05267330
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_05267320
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000000.00000000.245601499.000000000016C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameProcexp.exeB vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000000.00000002.252344344.0000000004CF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamedll.exe4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000000.00000003.248416107.0000000003825000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedll.exe4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000003.252420555.000000000150C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProcexp.exeB vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.0000000003751000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeBinary or memory string: OriginalFilenameProcexp.exeB vs HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: Section: 4SUP}s ZLIB complexity 1.000383148923445
      Source: dhcpmon.exe.1.drStatic PE information: Section: 4SUP}s ZLIB complexity 1.000383148923445
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeReversingLabs: Detection: 44%
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeVirustotal: Detection: 56%
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile read: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeJump to behavior
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess created: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess created: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_00A8B00E AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_00A8AFD7 AdjustTokenPrivileges,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_00DCB4CA AdjustTokenPrivileges,
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_00DCB493 AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.logJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/8@16/2
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\???????
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b210040d-15e5-44d6-9102-34199926a203}
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 2_2_051A6E30 pushad ; retf
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: section name: 4SUP}s
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeStatic PE information: section name:
      Source: dhcpmon.exe.1.drStatic PE information: section name: 4SUP}s
      Source: dhcpmon.exe.1.drStatic PE information: section name:
      Source: initial sampleStatic PE information: section name: 4SUP}s entropy: 7.998441047887134
      Source: initial sampleStatic PE information: section name: 4SUP}s entropy: 7.998441047887134
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeFile opened: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe TID: 5552Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe TID: 5296Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe TID: 5320Thread sleep time: -1520000s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe TID: 628Thread sleep time: -40000s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5216Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWindow / User API: foregroundWindowGot 825
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWindow / User API: foregroundWindowGot 769
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeCode function: 0_2_04952411 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeMemory written: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeProcess created: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.513465450.0000000001583000.00000004.00000020.00020000.00000000.sdmp, HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000003.352138949.000000000159A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerl
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000003.380630900.000000000154C000.00000004.00000020.00020000.00000000.sdmp, HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000003.319503227.0000000001541000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager$:
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.0000000003751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.0000000003751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.382f160.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.3904858.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38574e0.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.38a7bb8.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 4864, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe PID: 5368, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      Path Interception1
      Access Token Manipulation
      2
      Masquerading
      OS Credential Dumping11
      Security Software Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts112
      Process Injection
      1
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
      Access Token Manipulation
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script112
      Process Injection
      LSA Secrets2
      System Information Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Deobfuscate/Decode Files or Information
      Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Hidden Files and Directories
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
      Obfuscated Files or Information
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)12
      Software Packing
      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe45%ReversingLabsByteCode-MSIL.Trojan.Bulz
      HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe57%VirustotalBrowse
      HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe100%AviraHEUR/AGEN.1202424
      HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraHEUR/AGEN.1202424
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe45%ReversingLabsByteCode-MSIL.Trojan.Bulz
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe57%VirustotalBrowse
      SourceDetectionScannerLabelLinkDownload
      1.2.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.400000.0.unpack100%AviraHEUR/AGEN.1208316Download File
      0.0.HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe.e0000.0.unpack100%AviraHEUR/AGEN.1202424Download File
      SourceDetectionScannerLabelLink
      servicepoint.duckdns.org11%VirustotalBrowse
      SourceDetectionScannerLabelLink
      0%Avira URL Cloudsafe
      servicepoint.duckdns.org100%Avira URL Cloudmalware
      servicepoint.duckdns.org11%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      servicepoint.duckdns.org
      213.152.161.85
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      true
      • Avira URL Cloud: safe
      low
      servicepoint.duckdns.orgtrue
      • 11%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://google.comHEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        213.152.161.85
        servicepoint.duckdns.orgNetherlands
        49453GLOBALLAYERNLtrue
        IP
        192.168.2.1
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:798399
        Start date and time:2023-02-04 04:01:07 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 8m 15s
        Hypervisor based Inspection enabled:false
        Report type:light
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:15
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@6/8@16/2
        EGA Information:
        • Successful, ratio: 66.7%
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • TCP Packets have been reduced to 100
        • Excluded IPs from analysis (whitelisted): 93.184.221.240, 209.197.3.8
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net
        • Execution Graph export aborted for target HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe, PID 5368 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtDeviceIoControlFile calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        04:02:01API Interceptor838x Sleep call for process: HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe modified
        04:02:03AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        04:02:14API Interceptor1x Sleep call for process: dhcpmon.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Category:dropped
        Size (bytes):924672
        Entropy (8bit):6.4582092585373525
        Encrypted:false
        SSDEEP:12288:pLYT+m0qD8CEULAfPpIuG1JZnXiGDyQics5Ec0Y7JOfEhvlQd9DiTsOzLnWIKBlK:pE+K4ozvtYpjsBhX
        MD5:8C4F47A96A1F9F58AB28A2353627C153
        SHA1:4E7E9F7C7D630E2406FE76AD1576D35A773E9E06
        SHA-256:E1CFEEAABCFA9339523FAE340820F04895C7A8332B806FD4E813343516928DDE
        SHA-512:E251A5109139F7440F9E515F8132DC4116E59E29A0CDD2C9FC2DF2EE70B975EB6F8C1E373E5401C0B39A4D8BA9894EA3CCC7645E2C314214D787DFFF28D28478
        Malicious:true
        Yara Hits:
        • Rule: SUSP_NET_NAME_ConfuserEx, Description: Detects ConfuserEx packed file, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Arnim Rupp
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 45%
        • Antivirus: Virustotal, Detection: 57%, Browse
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....j.X.....................P............... ....@.. ...............................'....@.................................`...K....... ...............................................................................................H...........4SU.P.}s..... ......................@....text...H........................... ..`.rsrc... ............l..............@..@.reloc..............................@..B.................................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Reputation:high, very likely benign file
        Preview:[ZoneTransfer]....ZoneId=0
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):525
        Entropy (8bit):5.2874233355119316
        Encrypted:false
        SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0
        MD5:80EFBEC081D7836D240503C4C9465FEC
        SHA1:6AF398E08A359457083727BAF296445030A55AC3
        SHA-256:C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523
        SHA-512:DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3
        Malicious:true
        Reputation:high, very likely benign file
        Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..
        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):641
        Entropy (8bit):5.285418593366258
        Encrypted:false
        SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2+gYhD5iv:MLF20NaL3z2p29hJ5g522rW2+g2+
        MD5:63CC04E8E9DBE6842611C2E6E948F8FA
        SHA1:61F604AF4DABFEC36C39555FE4A32D1D6417927C
        SHA-256:0EDC65EF06683A15D2C8B6A455F8A29B29AE729069096A060D6C75E12AB0EB60
        SHA-512:57A4B08AEC6F1663C50AFF9259EEBFA50CCE8C4B406555E8522DCCF1E0DA03DA3686AE8208045D4ADC574396B9D8AD87B6C0D64FACE82AC913D2EBEC9A11700E
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:data
        Category:dropped
        Size (bytes):248
        Entropy (8bit):7.094528505897445
        Encrypted:false
        SSDEEP:6:X4LDAnybgCFcpJSQwP4d7r3l3TmKEt5mT1DhFtMhXvvHOxHB3GDq:X4LEnybgCFCtvd7bl3ThE4T19FtMhXvs
        MD5:061E700FE27D852034A5A44BF5985CCF
        SHA1:15B072DE6D6FDD92AE36F074345FA41985833E8D
        SHA-256:4BBB88AF530693EB4A710B0591D4BAF585837242C5690F5A821BF2FC9CC587CD
        SHA-512:CF6C5458AB50C859740490985D1E7E887D1116F3FA947FF2EC49AF9997A42F3402C63EF42B93498544195D9859FBB19CCC295966564B30F5ADB4A36D4E8886C6
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.w
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:data
        Category:dropped
        Size (bytes):8
        Entropy (8bit):3.0
        Encrypted:false
        SSDEEP:3:nS:nS
        MD5:936600CAA6F0F7229FF1F3E8F92BE5EB
        SHA1:311583C4CA7235B76A80EBF66DABB67119877474
        SHA-256:2632A97CC041EF4110299290C537C046021994E5A5C0E5970D6C6A7E11F917CD
        SHA-512:247551FBCD4BD20952910B2B33BDA3674558D71A24C16B8F9162CCC8D032CB0E7CFA0C85EC63E12200D46ACDECD5484BBB3653B64CABDE1538F8B2BB2CB1AA0E
        Malicious:true
        Preview:......H
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:data
        Category:modified
        Size (bytes):40
        Entropy (8bit):5.153055907333276
        Encrypted:false
        SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
        MD5:4E5E92E2369688041CC82EF9650EDED2
        SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
        SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
        SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
        Malicious:false
        Preview:9iH...}Z.4..f.~a........~.~.......3.U.
        Process:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File Type:data
        Category:dropped
        Size (bytes):433688
        Entropy (8bit):7.999519077450246
        Encrypted:true
        SSDEEP:12288:dcRKtiKlC1FGhWjoORvi5oCILR9Eax5uoj:KRCiKECCGoD9Eaioj
        MD5:D2D87B1E9F691E38698A9683C9E213C1
        SHA1:87FAA25A212348CCD20567929D52A0ADE5BE07CE
        SHA-256:4115C31136A8A8F4642D3F5E7032A248381FCF36B047CFD911F974600F140039
        SHA-512:541F3C4C9CA97C085065FA5881D9A336F0BE474C90D1C65379CA7CB7F084B6496ED52A61F9133FD29DE5DB57C2B1F2CC302498579C5A158F823612EAC248C5DC
        Malicious:false
        Preview:.........O.......\8..5N..`S.]..[r.$*>.\.#v&..$.......Z.i..M.Mn5.@..@...3.R..Y...}>C.b....Z........K..^.d...Z...K.#...dn$e ..XP.^.#.......V...dB.Kn.Y.c..-k....M.D...Q.S..R.X.........._...Zz...#.=<.V.NHZq.h..ON..oq.:...,7H....../..Q..R.u6.."....<.`..z.5b($..9.CF.F1...o?.h.}....;Ay....kL}7...I.-.}..D&...C....%.J..+..1.5.a..Ih....s........G..?..9^0e...p..FCvNt.e...B/...y.h.G.0..o,Q.2[..........e.P8.....yr...*..Q..*..../..S..m.......\.wA.a1.]...oW........PY..h....f:.....Ss.....\.8...@R._A...M..X....V.f).]z..u{.z-....W...NaT+.&:...1.D../.7..\.S..z..!.....#..F.d......*.m'..........6.2....:H...bd].._......}.n.=...l.7%r.>...B.Q.K..q...Ex.6.6....P..^...i...Mx...;g...,t..fCd.\.b....e{.\...Y=4......+..T....j}..|66g.s...z...Y.kTi..?Xy...5\...SO..W.U.3A.$.l..{.D...no.E..v.2.:..a..hdhO..t.w.k..T|Po.....D?..mG.[.2.;....+...8.6.h!..w.3...w.o.....|....f.v.to.B.{`o..a.....f.cu..........?......"...u..EA...^)W..z..jtU{^......5#....y.s.......e.l..&...%...
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):6.4582092585373525
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
        • Win32 Executable (generic) a (10002005/4) 49.96%
        • Win16/32 Executable Delphi generic (2074/23) 0.01%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        File size:924672
        MD5:8c4f47a96a1f9f58ab28a2353627c153
        SHA1:4e7e9f7c7d630e2406fe76ad1576d35a773e9e06
        SHA256:e1cfeeaabcfa9339523fae340820f04895c7a8332b806fd4e813343516928dde
        SHA512:e251a5109139f7440f9e515f8132dc4116e59e29a0cdd2c9fc2df2ee70b975eb6f8c1e373e5401c0b39a4d8ba9894ea3ccc7645e2c314214d787dfff28d28478
        SSDEEP:12288:pLYT+m0qD8CEULAfPpIuG1JZnXiGDyQics5Ec0Y7JOfEhvlQd9DiTsOzLnWIKBlK:pE+K4ozvtYpjsBhX
        TLSH:6C15FF9835203E9ECC5FC471DB791FE49E137E66430AC1D3643B29A9BA9C486CE543A3
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....j.X.....................P............... ....@.. ...............................'....@................................
        Icon Hash:f0d6e66799bcc678
        Entrypoint:0x4ea00a
        Entrypoint Section:
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x58016ADD [Fri Oct 14 23:31:41 2016 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [004EA000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1e8600x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x5ab20.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0xea0000x8
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x1e0000x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        4SUP}s0x20000x1a1100x1a200False1.000383148923445data7.998441047887134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .text0x1e0000x6c4480x6c600False0.6105757100634371data6.673125048528245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x8c0000x5ab200x5ac00False0.11296918044077135data4.047706271353626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0xe80000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        0xea0000x100x200False0.046875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x8c1d80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144
        RT_ICON0xce2000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536
        RT_ICON0xdea280x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384
        RT_ICON0xe2c500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
        RT_ICON0xe51f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
        RT_ICON0xe62a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024
        RT_GROUP_ICON0xe67080x5adata
        RT_VERSION0xe67640x3bcdataEnglishUnited States
        DLLImport
        mscoree.dll_CorExeMain
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        213.152.161.85192.168.2.36755497052810290 02/04/23-04:02:37.885591TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1675549705213.152.161.85192.168.2.3
        192.168.2.3213.152.161.854970067552816718 02/04/23-04:02:18.413039TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497006755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971167552816766 02/04/23-04:03:22.114925TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497116755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854970867552816766 02/04/23-04:02:58.659576TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497086755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971367552816766 02/04/23-04:03:34.873002TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497136755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971367552816718 02/04/23-04:03:32.601666TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497136755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971667552816766 02/04/23-04:03:58.093532TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497166755192.168.2.3213.152.161.85
        213.152.161.85192.168.2.36755497122841753 02/04/23-04:03:27.123757TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)675549712213.152.161.85192.168.2.3
        213.152.161.85192.168.2.36755497032841753 02/04/23-04:02:24.159041TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)675549703213.152.161.85192.168.2.3
        192.168.2.3213.152.161.854970567552816766 02/04/23-04:02:38.804523TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497056755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971567552816766 02/04/23-04:03:50.787453TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497156755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854970767552816766 02/04/23-04:02:51.380389TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497076755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854970367552816766 02/04/23-04:02:24.379082TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497036755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854970967552816766 02/04/23-04:03:05.988800TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497096755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971267552816766 02/04/23-04:03:27.448220TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497126755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971767552816766 02/04/23-04:04:04.561310TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497176755192.168.2.3213.152.161.85
        213.152.161.85192.168.2.36755497112841753 02/04/23-04:03:22.044641TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)675549711213.152.161.85192.168.2.3
        192.168.2.3213.152.161.854970067552816766 02/04/23-04:02:19.457207TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497006755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854970667552816766 02/04/23-04:02:45.198697TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497066755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971467552816766 02/04/23-04:03:42.744453TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497146755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854970467552816766 02/04/23-04:02:30.984485TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497046755192.168.2.3213.152.161.85
        192.168.2.3213.152.161.854971067552816766 02/04/23-04:03:16.374407TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497106755192.168.2.3213.152.161.85
        TimestampSource PortDest PortSource IPDest IP
        Feb 4, 2023 04:02:04.611284971 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:07.613686085 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:13.629790068 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:15.676836967 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:15.680389881 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.111125946 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.205787897 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.205946922 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.322611094 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.322686911 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.392013073 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.420710087 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.528934002 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.529026031 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.638359070 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.658832073 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.666656017 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.666857958 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.673273087 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.681354046 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.681562901 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.688656092 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.696311951 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.696590900 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.703542948 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.711205959 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.711426973 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.719104052 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.726268053 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.726416111 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.739782095 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.747046947 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.747176886 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.754599094 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.761791945 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.761902094 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.770402908 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.777575970 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.777683020 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.785461903 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.792680979 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.792895079 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.801043034 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.808748007 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.809031010 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.816339016 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.823241949 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.823446989 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.832508087 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.839982986 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.840135098 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.846998930 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.854598999 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.854706049 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.861953974 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.869898081 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.870024920 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.877110958 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.884836912 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.884959936 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.913599968 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.921849012 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.922086954 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.929075003 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.937515974 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.937809944 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.944855928 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.952564001 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.952915907 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.960236073 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.967772961 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.967920065 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.975361109 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.983282089 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.983412981 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:16.991182089 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.998938084 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:16.999104023 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.006727934 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.014380932 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.014542103 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.022173882 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.029648066 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.029809952 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.037746906 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.045418978 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.045552015 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.053241968 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.060940981 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.061116934 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.069979906 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.077694893 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.077814102 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.085335016 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.093101978 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.093220949 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.100375891 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.108539104 CET675549700213.152.161.85192.168.2.3
        Feb 4, 2023 04:02:17.108741999 CET497006755192.168.2.3213.152.161.85
        Feb 4, 2023 04:02:17.116328955 CET675549700213.152.161.85192.168.2.3
        TimestampSource PortDest PortSource IPDest IP
        Feb 4, 2023 04:02:04.475367069 CET4997753192.168.2.38.8.8.8
        Feb 4, 2023 04:02:04.585163116 CET53499778.8.8.8192.168.2.3
        Feb 4, 2023 04:02:23.751883030 CET5799053192.168.2.38.8.8.8
        Feb 4, 2023 04:02:23.861915112 CET53579908.8.8.8192.168.2.3
        Feb 4, 2023 04:02:28.712673903 CET5238753192.168.2.38.8.8.8
        Feb 4, 2023 04:02:28.820549965 CET53523878.8.8.8192.168.2.3
        Feb 4, 2023 04:02:36.860551119 CET5692453192.168.2.38.8.8.8
        Feb 4, 2023 04:02:36.968187094 CET53569248.8.8.8192.168.2.3
        Feb 4, 2023 04:02:43.029052019 CET6062553192.168.2.38.8.8.8
        Feb 4, 2023 04:02:43.047238111 CET53606258.8.8.8192.168.2.3
        Feb 4, 2023 04:02:49.385057926 CET4930253192.168.2.38.8.8.8
        Feb 4, 2023 04:02:49.403115034 CET53493028.8.8.8192.168.2.3
        Feb 4, 2023 04:02:56.138262987 CET5397553192.168.2.38.8.8.8
        Feb 4, 2023 04:02:56.245413065 CET53539758.8.8.8192.168.2.3
        Feb 4, 2023 04:03:03.168420076 CET5113953192.168.2.38.8.8.8
        Feb 4, 2023 04:03:03.277697086 CET53511398.8.8.8192.168.2.3
        Feb 4, 2023 04:03:11.669126034 CET5295553192.168.2.38.8.8.8
        Feb 4, 2023 04:03:11.687891960 CET53529558.8.8.8192.168.2.3
        Feb 4, 2023 04:03:21.697429895 CET6058253192.168.2.38.8.8.8
        Feb 4, 2023 04:03:21.804183006 CET53605828.8.8.8192.168.2.3
        Feb 4, 2023 04:03:26.464158058 CET5713453192.168.2.38.8.8.8
        Feb 4, 2023 04:03:26.572953939 CET53571348.8.8.8192.168.2.3
        Feb 4, 2023 04:03:32.089087009 CET6205053192.168.2.38.8.8.8
        Feb 4, 2023 04:03:32.199491024 CET53620508.8.8.8192.168.2.3
        Feb 4, 2023 04:03:39.334427118 CET5604253192.168.2.38.8.8.8
        Feb 4, 2023 04:03:39.441394091 CET53560428.8.8.8192.168.2.3
        Feb 4, 2023 04:03:48.096045971 CET5963653192.168.2.38.8.8.8
        Feb 4, 2023 04:03:48.114181042 CET53596368.8.8.8192.168.2.3
        Feb 4, 2023 04:03:55.169281006 CET5563853192.168.2.38.8.8.8
        Feb 4, 2023 04:03:55.187141895 CET53556388.8.8.8192.168.2.3
        Feb 4, 2023 04:04:02.506531954 CET5770453192.168.2.38.8.8.8
        Feb 4, 2023 04:04:02.526576996 CET53577048.8.8.8192.168.2.3
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Feb 4, 2023 04:02:04.475367069 CET192.168.2.38.8.8.80x38ceStandard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:23.751883030 CET192.168.2.38.8.8.80xe29dStandard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:28.712673903 CET192.168.2.38.8.8.80x6bc8Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:36.860551119 CET192.168.2.38.8.8.80x1fc4Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:43.029052019 CET192.168.2.38.8.8.80x9b90Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:49.385057926 CET192.168.2.38.8.8.80xe464Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:56.138262987 CET192.168.2.38.8.8.80x1c8cStandard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:03.168420076 CET192.168.2.38.8.8.80xd889Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:11.669126034 CET192.168.2.38.8.8.80x1f72Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:21.697429895 CET192.168.2.38.8.8.80x3bb2Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:26.464158058 CET192.168.2.38.8.8.80x4477Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:32.089087009 CET192.168.2.38.8.8.80x6db4Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:39.334427118 CET192.168.2.38.8.8.80xc4e7Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:48.096045971 CET192.168.2.38.8.8.80x4382Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:55.169281006 CET192.168.2.38.8.8.80x4de6Standard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        Feb 4, 2023 04:04:02.506531954 CET192.168.2.38.8.8.80x627aStandard query (0)servicepoint.duckdns.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Feb 4, 2023 04:02:04.585163116 CET8.8.8.8192.168.2.30x38ceNo error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:23.861915112 CET8.8.8.8192.168.2.30xe29dNo error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:28.820549965 CET8.8.8.8192.168.2.30x6bc8No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:36.968187094 CET8.8.8.8192.168.2.30x1fc4No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:43.047238111 CET8.8.8.8192.168.2.30x9b90No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:49.403115034 CET8.8.8.8192.168.2.30xe464No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:02:56.245413065 CET8.8.8.8192.168.2.30x1c8cNo error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:03.277697086 CET8.8.8.8192.168.2.30xd889No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:11.687891960 CET8.8.8.8192.168.2.30x1f72No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:21.804183006 CET8.8.8.8192.168.2.30x3bb2No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:26.572953939 CET8.8.8.8192.168.2.30x4477No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:32.199491024 CET8.8.8.8192.168.2.30x6db4No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:39.441394091 CET8.8.8.8192.168.2.30xc4e7No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:48.114181042 CET8.8.8.8192.168.2.30x4382No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:03:55.187141895 CET8.8.8.8192.168.2.30x4de6No error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false
        Feb 4, 2023 04:04:02.526576996 CET8.8.8.8192.168.2.30x627aNo error (0)servicepoint.duckdns.org213.152.161.85A (IP address)IN (0x0001)false

        Click to jump to process

        Target ID:0
        Start time:04:01:59
        Start date:04/02/2023
        Path:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        Imagebase:0xe0000
        File size:924672 bytes
        MD5 hash:8C4F47A96A1F9F58AB28A2353627C153
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.251706419.0000000003801000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.251706419.0000000003904000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.251706419.00000000038A7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        Reputation:low

        Target ID:1
        Start time:04:02:01
        Start date:04/02/2023
        Path:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-e1cfeeaabcfa93.exe
        Imagebase:0xde0000
        File size:924672 bytes
        MD5 hash:8C4F47A96A1F9F58AB28A2353627C153
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.516146416.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.516146416.0000000003751000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.511625925.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
        Reputation:low

        Target ID:2
        Start time:04:02:11
        Start date:04/02/2023
        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Wow64 process (32bit):true
        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Imagebase:0x610000
        File size:924672 bytes
        MD5 hash:8C4F47A96A1F9F58AB28A2353627C153
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: SUSP_NET_NAME_ConfuserEx, Description: Detects ConfuserEx packed file, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Arnim Rupp
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 45%, ReversingLabs
        • Detection: 57%, Virustotal, Browse
        Reputation:low

        Target ID:3
        Start time:04:02:15
        Start date:04/02/2023
        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Wow64 process (32bit):
        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Imagebase:
        File size:924672 bytes
        MD5 hash:8C4F47A96A1F9F58AB28A2353627C153
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:low

        No disassembly