Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe

Overview

General Information

Sample Name:Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
Analysis ID:881372
MD5:d2c96c075741ccd8bed558e39838a59d
SHA1:09667b1bef10f69697d997a26d9d963dfe4bdeb3
SHA256:d2a573edc893e24fbf245c4f8f918ec3b4f04fab928f073a24da3cb741d18388
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for dropped file
Sigma detected: Drops script at startup location
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Binary is likely a compiled AutoIt script file
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a start menu entry (Start Menu\Programs\Startup)
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe (PID: 7044 cmdline: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe MD5: D2C96C075741CCD8BED558E39838A59D)
    • MSBuild.exe (PID: 5980 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 5916 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 5744 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 3100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • znytpstdcrwsisx.exe (PID: 5292 cmdline: "C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe" MD5: A360B0402DD16AE837F59D09E1BF3B3C)
    • MSBuild.exe (PID: 5944 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "2ad4e32f-c687-4329-b5e5-302ef0e0", "Group": "Default", "Domain1": "nickdns22.duckdns.org", "Domain2": "127.0.0.1", "Port": 1896, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.urlMethodology_Suspicious_Shortcut_Local_URLDetects local script usage for .URL persistence@itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
  • 0x14:$file: URL=file:///
  • 0x71:$file: URL=file:///
  • 0x0:$url_explicit: [InternetShortcut]
  • 0x5d:$url_explicit: [InternetShortcut]
SourceRuleDescriptionAuthorStrings
00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0xfd9d:$x1: NanoCore.ClientPluginHost
  • 0xfdda:$x2: IClientNetworkHost
  • 0x1390d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfb05:$a: NanoCore
    • 0xfb15:$a: NanoCore
    • 0xfd49:$a: NanoCore
    • 0xfd5d:$a: NanoCore
    • 0xfd9d:$a: NanoCore
    • 0xfb64:$b: ClientPlugin
    • 0xfd66:$b: ClientPlugin
    • 0xfda6:$b: ClientPlugin
    • 0xfc8b:$c: ProjectData
    • 0x10692:$d: DESCrypto
    • 0x1805e:$e: KeepAlive
    • 0x1604c:$g: LogClientMessage
    • 0x12247:$i: get_Connected
    • 0x109c8:$j: #=q
    • 0x109f8:$j: #=q
    • 0x10a14:$j: #=q
    • 0x10a44:$j: #=q
    • 0x10a60:$j: #=q
    • 0x10a7c:$j: #=q
    • 0x10aac:$j: #=q
    • 0x10ac8:$j: #=q
    00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xfd9d:$a1: NanoCore.ClientPluginHost
    • 0xfd5d:$a2: NanoCore.ClientPlugin
    • 0x11cb6:$b1: get_BuilderSettings
    • 0xfbb9:$b2: ClientLoaderForm.resources
    • 0x113d6:$b3: PluginCommand
    • 0xfd8e:$b4: IClientAppHost
    • 0x1a20e:$b5: GetBlockHash
    • 0x1230e:$b6: AddHostEntry
    • 0x16001:$b7: LogClientException
    • 0x1227b:$b8: PipeExists
    • 0xfdc7:$b9: IClientLoggingHost
    00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x35a4d:$x1: NanoCore.ClientPluginHost
    • 0x35a8a:$x2: IClientNetworkHost
    • 0x395bd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 150 entries
    SourceRuleDescriptionAuthorStrings
    7.2.MSBuild.exe.31e3c74.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    7.2.MSBuild.exe.31e3c74.1.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    7.2.MSBuild.exe.31e3c74.1.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xe38:$x2: NanoCore.ClientPlugin
    • 0xe75:$x3: NanoCore.ClientPluginHost
    • 0xe5a:$i1: IClientApp
    • 0xe4e:$i2: IClientData
    • 0xe29:$i3: IClientNetwork
    • 0xec3:$i4: IClientAppHost
    • 0xe65:$i5: IClientDataHost
    • 0xeb0:$i6: IClientLoggingHost
    • 0xe8f:$i7: IClientNetworkHost
    • 0xea2:$i8: IClientUIHost
    • 0xed2:$i9: IClientNameObjectCollection
    • 0xef7:$i10: IClientReadOnlyNameObjectCollection
    • 0xe41:$s1: ClientPlugin
    • 0x177c:$s1: ClientPlugin
    • 0x1789:$s1: ClientPlugin
    • 0x11f9:$s6: get_ClientSettings
    • 0x1249:$s7: get_Connected
    7.2.MSBuild.exe.31e3c74.1.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xe75:$a1: NanoCore.ClientPluginHost
    • 0xe38:$a2: NanoCore.ClientPlugin
    • 0x120c:$b1: get_BuilderSettings
    • 0xec3:$b4: IClientAppHost
    • 0x127d:$b6: AddHostEntry
    • 0x12ec:$b7: LogClientException
    • 0x1261:$b8: PipeExists
    • 0xeb0:$b9: IClientLoggingHost
    6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 190 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, ProcessId: 7044, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.url

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ParentImage: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ParentProcessId: 5980, ParentProcessName: MSBuild.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp, ProcessId: 5916, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 5980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.3192.169.69.264971118962025019 06/04/23-11:28:18.475887
    SID:2025019
    Source Port:49711
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264971718962025019 06/04/23-11:28:50.523433
    SID:2025019
    Source Port:49717
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264970718962025019 06/04/23-11:27:57.173727
    SID:2025019
    Source Port:49707
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264971218962025019 06/04/23-11:28:23.420896
    SID:2025019
    Source Port:49712
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264971318962025019 06/04/23-11:28:28.432846
    SID:2025019
    Source Port:49713
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264971918962025019 06/04/23-11:29:00.977409
    SID:2025019
    Source Port:49719
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264971818962025019 06/04/23-11:28:55.916794
    SID:2025019
    Source Port:49718
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264970518962025019 06/04/23-11:27:45.907549
    SID:2025019
    Source Port:49705
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264969918962025019 06/04/23-11:27:14.981963
    SID:2025019
    Source Port:49699
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264970618962025019 06/04/23-11:27:50.915043
    SID:2025019
    Source Port:49706
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264970118962025019 06/04/23-11:27:25.413836
    SID:2025019
    Source Port:49701
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.3192.169.69.264970018962025019 06/04/23-11:27:20.405611
    SID:2025019
    Source Port:49700
    Destination Port:1896
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2ad4e32f-c687-4329-b5e5-302ef0e0", "Group": "Default", "Domain1": "nickdns22.duckdns.org", "Domain2": "127.0.0.1", "Port": 1896, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeReversingLabs: Detection: 70%
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeVirustotal: Detection: 65%Perma Link
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeAvira: detected
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeAvira: detection malicious, Label: DR/AutoIt.Gen8
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeReversingLabs: Detection: 80%
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTR
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
    Source: Binary string: indows\MSBuild.pdbpdbild.pdbs source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\B\T\BuildResults\bin\Release\TextExtractor.pdb666 source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372161750.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\MSBuild.pdbf source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: f:\Agent\_work\24\s\Win32\Release\junction.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\exe\MSBuild.pdb source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: remoting_desktop.exe.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.dr
    Source: Binary string: C:\agent\_work\93\s\Win32\Release Console\autorunsc.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\B\T\BuildResults\bin\Release\TextExtractor.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372161750.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\symbols\exe\MSBuild.pdb source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49699 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49700 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49701 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49711 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49712 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49713 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49717 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49718 -> 192.169.69.26:1896
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49719 -> 192.169.69.26:1896
    Source: Malware configuration extractorURLs: nickdns22.duckdns.org
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: unknownDNS query: name: nickdns22.duckdns.org
    Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
    Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
    Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
    Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
    Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
    Source: unknownTCP traffic detected without corresponding DNS query: 209.197.3.8
    Source: unknownTCP traffic detected without corresponding DNS query: 23.36.225.155
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.88
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: http://citationstyles.org/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/3.0/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab:
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: http://p.yusukekamiyamane.com/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: http://support.mendeley.com/customer/portal/articles/227955
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sysinternals.com
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sysinternals.comFileVersionLegalCopyright
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: http://www.sysinternals.comFileVersionLegalCopyrightLISTBOXDEL:AllUsersuserComputerscomputerGroupsgr
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.364770823.0000000004CB8000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sysinternals.comWindowPositionSOFTWARE
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sysinternals.comopenConnection
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sysinternals.comopenThe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://citationstyles.org
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://clients2.google.com/service/update2/crxupdate_urlBrowser
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://crashpad.chromium.org/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://crashpad.chromium.org/bug/new
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://csl.mendeley.com
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://github.com/Juris-M/citeproc-js
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://github.com/citation-style-language/styles
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ims-na1-stg1.adobelogin.com
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ims-prod06.adobelogin.com
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-cops-dev.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-cops-dev.adobe.iohttps://lcs-cops-stage.adobe.iohttps://lcs-cops.adobe.iohttps://lcs-rob
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-cops-stage.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-cops.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-robs-dev.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-robs-stage.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-robs.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-ulecs-dev.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-ulecs-stage.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lcs-ulecs.adobe.io
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://plasma.kde.org
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://rrchnm.org/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://service.elsevier.com/app/answers/detail/a_id/19611/kw/duplicates/supporthub/mendeley/Yes
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://service.elsevier.com/app/answers/detail/a_id/22094/kw/migrate/supporthub/mendeley/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://service.elsevier.com/app/contact/supporthub/mendeley?dgcid=Mendeley_Desktop_Help-menu-Contac
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://service.elsevier.com/app/home/supporthub/mendeley/?dgcid=Mendeley_Desktop_Help-menu-FAQ
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.elsevier.com/legal/elsevier-website-terms-and-conditions
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.elsevier.com/legal/privacy-policy
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.gmu.edu/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.mendeley.com/guides?dgcid=Mendeley_Desktop_Help-menu-Help-guides
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.mendeley.com/guides?dgcid=Mendeley_Desktop_Help-menu-Help-guideshttps://www.mendeley.com
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.mendeley.com/library
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.mendeley.com?dgcid=Mendeley_Desktop_Help-menu-website
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.sysinternals.comntdllRtlInitUnicodeStringNtOpenDirectoryObjectNtQuerySectionNtQueryDirec
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.virustotal.com/about/terms-of-service%s
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.virustotal.com/en/about/terms-of-service/
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.virustotal.comPOST4e3202fdbe953d628f650229af5b3eb49cd46b2d3bfe5546ae3c5fa48b554e0capikey
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: https://www.zotero.org/
    Source: unknownDNS traffic detected: queries for: nickdns22.duckdns.org
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_05022AC6 WSARecv,
    Source: MSBuild.exe, 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTR

    System Summary

    barindex
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.630789913.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.364108293.000000000487B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.364108293.000000000487B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000000.361773437.000000000037E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000000.361773437.000000000037E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: 0SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005B78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C "!CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
    Source: znytpstdcrwsisx.exe, 00000006.00000002.411194467.0000000000E9E000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: znytpstdcrwsisx.exe, 00000006.00000002.411194467.0000000000E9E000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: znytpstdcrwsisx.exe.0.drString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 7.2.MSBuild.exe.31e3c74.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.MSBuild.exe.5640000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.MSBuild.exe.2dd16f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.630789913.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.url, type: DROPPEDMatched rule: Methodology_Suspicious_Shortcut_Local_URL author = @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson), description = Detects local script usage for .URL persistence, score = 27.09.2019, reference = https://twitter.com/cglyer/status/1176184798248919044
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_00E17AC1
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_02918678
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_02919278
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_029123A0
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_02912FA8
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_02913850
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0291AD18
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0291933F
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_02919B20
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0291306F
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 4_2_05651DF8
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 4_2_05650708
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 7_2_02E423A0
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 7_2_02E42FA8
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 7_2_02E43850
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 7_2_02E4306F
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_05023012 NtQuerySystemInformation,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_05022FD7 NtQuerySystemInformation,
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CompanyNameCompanyShortNameInternalNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls\VarFileInfo\Translation\../../base/files/file_util_win.ccMakeAbsoluteFilePathDeleteFileAfterRebootDeleteFileEvenIfInUseNtSetInformationFilentdll.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CompanyNameCompanyShortNameInternalNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls\VarFileInfo\Translation\../../base/files/file_util_win.ccMakeAbsoluteFilePathDeleteFileAfterRebootDeleteFileEvenIfInUseNtSetInformationFilentdll.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.000000000542E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CompanyNameCompanyShortNameInternalNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls\VarFileInfo\Translation\../../base/files/file_util_win.ccMakeAbsoluteFilePathDeleteFileAfterRebootDeleteFileEvenIfInUseNtSetInformationFilentdll.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.364770823.0000000004CB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CompanyNameCompanyShortNameInternalNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls\VarFileInfo\Translation\../../base/files/file_util_win.ccMakeAbsoluteFilePathDeleteFileAfterRebootDeleteFileEvenIfInUseNtSetInformationFilentdll.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CompanyNameCompanyShortNameInternalNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls\VarFileInfo\Translation\../../base/files/file_util_win.ccMakeAbsoluteFilePathDeleteFileAfterRebootDeleteFileEvenIfInUseNtSetInformationFilentdll.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PathVerifiedDatePublisherCompanyDescriptionProductProduct VersionFile VersionMachine TypeBinary VersionOriginal NameInternal NameCopyrightCommentsEntropyMD5SHA1PESHA1PESHA256SHA256IMPVT detectionVT link\RtlNtStatusToDosErrorntdll.dll%c%sAccess denied.ValidThis certificate or one of the certificates in the certificate chain is not time valid.Trust for this certificate or one of the certificates in the certificate chain has been revoked.The certificate or one of the certificates in the certificate chain does not have a valid signature.The certificate or certificate chain is not valid for its proposed usage.The certificate or certificate chain is based on an untrusted root.The revocation status of the certificate or one of the certificates in the certificate chain is unknown.One of the certificates in the chain was issued by a certification authority that the original certificate had certified.One of the certificates has an extension that is not valid.The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension.The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded.The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields.The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate.The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded.The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.The end certificate does not have any resultant issuance policies, and one of the issuing certification authority certificates has a policy constraints extension requiring it.The certificate is explicitly distrusted.The certificate does not support a critical extension.The certificate has not been strong signed.., Invalid signature%d.%d.%d.%dn/aProductVersionOriginalFileNameWow64DisableWow64FsRedirectionKernel32.dllIsWow64Processrsaenh.dllmsisip.dllncrypt.dllbcrypt.dllcryptsp.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: J\VarFileInfo\Translation\D:\B\T\Imports\Open\Chrome\Chrome\src\base\file_version_info_win.ccCompanyNameCompanyShortNameInternalNameProductNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeBinary or memory string: CompanyNameCompanyShortNameInternalNameProductShortNameProductVersionFileDescriptionFileVersionOriginalFilenameSpecialBuild\StringFileInfo\%04x%04x\%ls\VarFileInfo\Translation\../../base/files/file_util_win.ccMakeAbsoluteFilePathDeleteFileAfterRebootDeleteFileEvenIfInUseNtSetInformationFilentdll.dll vs Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: Number of sections : 72 > 10
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Number of sections : 72 > 10
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeReversingLabs: Detection: 70%
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeVirustotal: Detection: 65%
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeFile read: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeJump to behavior
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe "C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe"
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_05022DD2 AdjustTokenPrivileges,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_05022D9B AdjustTokenPrivileges,
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeFile created: C:\Users\user\AppData\Roaming\hdoydskbdxJump to behavior
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeFile created: C:\Users\user\AppData\Local\Temp\aut8DF8.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@11/9@12/2
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3676:120:WilError_01
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2ad4e32f-c687-4329-b5e5-302ef0e0906d}
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3100:120:WilError_01
    Source: MSBuild.exe, 00000004.00000002.393114971.00000000034B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: *.sln
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: /cite/word/install
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: Couldn't find documents: You have selected documents from both My Library a Shared Group, or from multiple Shared Groups, which is not supported.Documents in multiple groupsPlease select the documents you wish to cite.importing %1 documents from plugin into ??geometry/newLibrarySplittergeometry/horizontalSplittergeometry/verticalSplitterSynchronizing - Step %1 of %2GroupFilterCollectionDeletedFilter1trigger()Synchronizing Zotero - Step %1 of %22duplicateSearchStarted(WorkerJob::Pointer)1highlightAndScrollTo(QList<Document::Pointer>)2allJobsFinished(QList<Document::Pointer>)Invite/invite/?dgcid=Mendeley_Desktop_Invite-colleagues/cite/word/install/importshowSignInmendeley://loginshowJoinMendeleyFormmendeley://registerDelete this document from your library?Delete %1 documents from your library?
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: https://www.mendeley.com/guides?dgcid=Mendeley_Desktop_Help-menu-Help-guides
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: 1openHelpGuides()Help Guides1openMendeleyWebsite()Mendeley Website1openFAQ()FAQ1openContactSupport()Contact SupportCheck for UpdatesCheck Now1toggleCheckForPreviewUpdates()Create Backup...1openMendeleyPrivacyPolicy()Privacy Policy1openMendeleyTandCs()Terms and Conditions1showAbout()https://www.mendeley.com/guides?dgcid=Mendeley_Desktop_Help-menu-Help-guideshttps://www.mendeley.com?dgcid=Mendeley_Desktop_Help-menu-websitehttps://www.elsevier.com/legal/elsevier-website-terms-and-conditionshttps://www.elsevier.com/legal/privacy-policyhttps://service.elsevier.com/app/home/supporthub/mendeley/?dgcid=Mendeley_Desktop_Help-menu-FAQhttps://service.elsevier.com/app/contact/supporthub/mendeley?dgcid=Mendeley_Desktop_Help-menu-Contact-SupportOpt-out of Experimental ReleasesOpt-in to Experimental Releases
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: Try '%ls --help' for more information.
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeString found in binary or memory: Try '%ls --help' for more information.
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic file information: File size 4967948 > 1048576
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: indows\MSBuild.pdbpdbild.pdbs source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\B\T\BuildResults\bin\Release\TextExtractor.pdb666 source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372161750.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\MSBuild.pdbf source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: f:\Agent\_work\24\s\Win32\Release\junction.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\exe\MSBuild.pdb source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: remoting_desktop.exe.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.dr
    Source: Binary string: C:\agent\_work\93\s\Win32\Release Console\autorunsc.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\B\T\BuildResults\bin\Release\TextExtractor.pdb source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372161750.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\symbols\exe\MSBuild.pdb source: MSBuild.exe, 00000001.00000002.630556075.00000000028E6000.00000004.00000020.00020000.00000000.sdmp
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

    Data Obfuscation

    barindex
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_00E174AC push ecx; ret
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_00E174B8 push ebp; ret
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_00E1549B push edi; retn 0000h
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_00E19D5C push 7800E1CBh; retf
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_00E19E34 pushfd ; retf
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: eSkkNGPG
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: PTcLNQBR
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: uhxZiqpZ
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: bMgQsjaV
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: GBMbimfi
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: DgfAMsww
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: rSvCgsmi
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: YskjstAT
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: LoVCKuYF
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: WVocwQqb
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: oSCGvaQZ
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: yZjSVOZX
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: QXbsjhZl
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: yyMCijkk
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: mpFeMMWO
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: lykrKTJc
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: uiehIGyj
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: zVFOZMAw
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: YlpJAimU
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: JwzqdXdu
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: UGiiFcPP
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: WQbVwRsn
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: tPcESPxm
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: aJkBpZiD
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: oVRlQlUl
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: kJDrTOOv
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: dPNhZlJs
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: tpgvdaSU
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: stGTwKsk
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: NWtntEHY
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: SeCKBtus
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: YLnRofwZ
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: ITlNviCX
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: xXKSfIFI
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: rzHoctSy
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: tqGkaUrY
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: XUULAqjj
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: OJKanVIF
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: XOKAQdyM
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: bvHwouBZ
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: emfUrPdE
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: wDjKtsMK
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: mVRJZClE
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: tOofDbnU
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: jMZzwYXU
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: nBeILfXx
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: vXOIjvTV
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: HdeHlMsv
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: INgZfirH
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: kDTxXhPW
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: WGoHkNIX
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: KQZwnOJl
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: TIucAObT
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: LbFXKCFw
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: zVPYqkoM
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: FueMosXg
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: iRDivbUE
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: qqDFgVrq
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: NoZwckKd
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: xegiIWpk
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: lFLuySNA
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: yfUTtHPf
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: HFrIlBYb
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: NCFRXlWT
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: DOngBUEn
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: XkEBteUo
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: section name: JfnpBUQQ
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: eSkkNGPG
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: PTcLNQBR
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: uhxZiqpZ
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: bMgQsjaV
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: GBMbimfi
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: DgfAMsww
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: rSvCgsmi
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: YskjstAT
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: LoVCKuYF
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: WVocwQqb
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: oSCGvaQZ
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: yZjSVOZX
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: QXbsjhZl
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: yyMCijkk
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: mpFeMMWO
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: lykrKTJc
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: uiehIGyj
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: zVFOZMAw
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: YlpJAimU
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: JwzqdXdu
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: UGiiFcPP
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: WQbVwRsn
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: tPcESPxm
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: aJkBpZiD
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: oVRlQlUl
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: kJDrTOOv
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: dPNhZlJs
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: tpgvdaSU
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: stGTwKsk
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: NWtntEHY
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: SeCKBtus
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: YLnRofwZ
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: ITlNviCX
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: xXKSfIFI
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: rzHoctSy
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: tqGkaUrY
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: XUULAqjj
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: OJKanVIF
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: XOKAQdyM
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: bvHwouBZ
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: emfUrPdE
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: wDjKtsMK
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: mVRJZClE
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: tOofDbnU
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: jMZzwYXU
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: nBeILfXx
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: vXOIjvTV
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: HdeHlMsv
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: INgZfirH
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: kDTxXhPW
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: WGoHkNIX
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: KQZwnOJl
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: TIucAObT
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: LbFXKCFw
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: zVPYqkoM
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: FueMosXg
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: iRDivbUE
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: qqDFgVrq
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: NoZwckKd
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: xegiIWpk
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: lFLuySNA
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: yfUTtHPf
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: HFrIlBYb
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: NCFRXlWT
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: DOngBUEn
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: XkEBteUo
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: section name: JfnpBUQQ
    Source: znytpstdcrwsisx.exe.0.drStatic PE information: real checksum: 0x12035b should be: 0x4c650c
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeStatic PE information: real checksum: 0x12035b should be: 0x4c8c6f
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeFile created: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.urlJump to behavior
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.urlJump to behavior
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IIRP_MJ_FASTIO_PROCMON.EXEPROCEXP.EXEAUTORUNS.EXESYSTEMPAGEFILE.SYS$MFT$MFTMIRR$LOGFILE$VOLUME$ATTRDEF$ROOT$BITMAP$BOOT$BADCLUS$SECURE$UPCASE$EXTENDFAST IOINCLUDEEXCLUDE<BAD>OKAY TO OVERWRITE EVENT LOG ''?AN ERROR OCCURRED OPENING THE SNAPSHOT ''APPLYING EVENT FILTEROPERATION CANCELLED: THE LISTVIEW DATA MAY BE INCOMPLETEPROCESS MONITOR CAN OPEN AT MOST BACKING FILES<PAGEFILE>YESNOEVENTPROCESSINDEXSTACKFRAMEDEPTHADDRESS + PATHLOCATIONPROCESSPROCESSIDPARENTPROCESSIDPARENTPROCESSINDEXAUTHENTICATIONIDCREATETIMEFINISHTIMEISVIRTUALIZEDIS64BITINTEGRITYOWNERPROCESSNAMECOMMANDLINECOMPANYNAMEVERSIONDESCRIPTIONMODULELISTMODULETIMESTAMPBASEADDRESSSIZECOMPANYPROCESS MONITOR - EXPORTING EVENT DATAWT, CCS=UTF-8"%S"
    Source: znytpstdcrwsisx.exe, 00000006.00000003.407665734.0000000001660000.00000004.00000020.00020000.00000000.sdmp, znytpstdcrwsisx.exe, 00000006.00000002.412419937.0000000001660000.00000004.00000020.00020000.00000000.sdmp, znytpstdcrwsisx.exe, 00000006.00000003.407387450.0000000001659000.00000004.00000020.00020000.00000000.sdmp, znytpstdcrwsisx.exe, 00000006.00000003.407487257.0000000001660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIECTRL.EXE
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.390170315.000000000138A000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383953493.000000000138A000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.389792384.000000000138A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIECTRL.EXEI0
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6840Thread sleep time: -1844674407370954s >= -30000s
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 4184Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5580Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 844
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeProcess information queried: ProcessInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0502140A GetSystemInfo,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: MSBuild.exe, 00000001.00000002.629865892.0000000000EA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW[
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.389792384.000000000138A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exeG-
    Source: MSBuild.exe, 00000001.00000002.629865892.0000000000EA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
    Source: znytpstdcrwsisx.exe, 00000006.00000003.407487257.0000000001660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exe&44
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeCode function: 0_2_04FE0175 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeCode function: 0_2_04FE0175 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeCode function: 0_2_04FE05B5 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeCode function: 0_2_04FE0365 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeCode function: 0_2_04FE0405 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeCode function: 6_2_020B0175 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeCode function: 6_2_020B0175 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeCode function: 6_2_020B05B5 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeCode function: 6_2_020B0365 mov edx, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeCode function: 6_2_020B0405 mov edx, dword ptr fs:[00000030h]
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 402000
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 420000
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 422000
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 891008
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 402000
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 420000
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 422000
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: C61008
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 protect: page execute and read and write
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp
    Source: C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: MSBuild.exe, 00000001.00000003.446100964.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.630789913.0000000003045000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000002.630789913.0000000002FCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: MSBuild.exe, 00000001.00000003.446100964.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000003.594171004.0000000000F38000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000001.00000003.592088557.0000000000F38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managersoft.NET\Framework\v2.0.50727\MSBuild.exe
    Source: MSBuild.exe, 00000001.00000002.630789913.0000000003045000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager0
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
    Source: MSBuild.exe, 00000001.00000002.629865892.0000000000EA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerT
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Software\Microsoft\Windows\CurrentVersion\Policies\SystemEnableLUA/RegisterFileTypesOwnership /PRODUCT:Reader /VERSION:12.0 /FixPDF 3305580Click on 'Change' to select default PDF handler.pdf Properties#32770Click on 'Change' to select default PDF handler Properties#32770Click on 'Change' to select default PDF handler#32770/\ADelRCP.exeClick on 'Change' to select default PDF handler.pdfpropertiesShowAppPickerForPDF.exeProgram ManagerPROGMANClick on 'Change' to select default PDF handler.pdf Properties#32770Click on 'Change' to select default PDF handler Properties#32770Click on 'Change' to select default PDF handler#32770Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\UserChoiceSoftware\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\UserChoiceSoftware\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdfApplication{A6EADE66-0000-0000-484E-7E8A45000000}SOFTWARE\Adobe\Acrobat Reader\{AC76BA86-0000-0000-7761-7E8A45000000}SOFTWARE\Adobe\Adobe Acrobat\SOFTWARE\Adobe\Adobe Acrobat\{AC76BA86-0000-0000-7760-7E8A45000000}{AC76BA86-0000-0000-BA7E-7E8A45000000}SOFTWARE\Adobe\Adobe Acrobat\VersionMajorVersionMinor12VersionStringInstalledProductNameAdobe AcrobatreaderSOFTWARE\Wow6432Node\Adobe\Acrobat Reader\SOFTWARE\Wow6432Node\Adobe\Adobe Acrobat\SOFTWARE\Adobe\Acrobat Reader\SOFTWARE\Adobe\Adobe Acrobat\.0\InstallerPATHVersionMajorVersionMinor1207760-BA7E-7AD7-VersionStringInstalledProductNameAdobe AcrobatreaderSOFTWARE\Wow6432Node\Adobe\Acrobat Reader\SOFTWARE\Wow6432Node\Adobe\Adobe Acrobat\SOFTWARE\Adobe\Acrobat Reader\SOFTWARE\Adobe\Adobe Acrobat\.0DC\InstallerENU_GUIDPATHInstallLocationAcroExch.Document.DC.pdfTrunk{AC76BA86-0000-0000-7760-7E8A45000000}BetaDCVersionMajorSOFTWARE\Google\Chrome\SOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkajSOFTWARE\Google\Chrome\NativeMessagingHosts\com.adobe.acrobat.chrome_webcapturehttps://clients2.google.com/service/update2/crxupdate_urlBrowser\WCChromeExtn\manifest.jsonAcrobat.Document.SOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkajAcrobat.Document.11.pdfSOFTWARE\Google\Chrome\NativeMessagingHosts\.com.adobe.acrobat.chrome_webcaptureSOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkaj{AC76BA86-0000-0000-7760-7E8A45000000}VersionMajorLowerCoExVersionSOFTWARE\Adobe\Adobe Acrobat\DC\InstallerCoExRepairDone\NotificationAppxSOFTWARE\Adobe\Acrobat Reader\\DC\SOFTWARE\Adobe\Acrobat Reader\\DC\Installer\AppVersionAppVersionINSTALLUWPAPP=1 REINSTALLMODE=omus DISABLE_FIU_CHECK=1 IGNOREAAM=1 REPAIRFROMAPP=1 /qn/i msiexec.exe ADD_ALL_DICT=1 REINSTALL=AdobeCommonLinguistics SKIP_WEBRCS_REINSTALL=1 SKIP_CEF_KILL=1 /qn/i msiexec.exeAppDoNotTakePDFOwnershipAtLaunchAppDoNotTakePDFOwnershipAtLaunchWin10DisableOwnershipPrompt.pdf.pdfxml.acrobatsecuritysettings.fdf.xfdf.xdp.pdx.api.secstoreAdobe Reader XIRtlGetVersionntdll.dll\??\UNC\\\\\?\UNC\\Device\Mup\\Device\LanmanRedirector\\Device\WebDavRedirector\\Device\WinDfs\\Device\NetWareRedirector\\Device\nwrd
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Software\Microsoft\Windows\CurrentVersion\Policies\SystemEnableLUA/RegisterFileTypesOwnership /PRODUCT:Acrobat /VERSION:12.0 /FixPDF 3305580Click on 'Change' to select default PDF handler.pdf Properties#32770Click on 'Change' to select default PDF handler Properties#32770Click on 'Change' to select default PDF handler#32770/\ADelRCP.exeClick on 'Change' to select default PDF handler.pdfpropertiesShowAppPickerForPDF.exeProgram ManagerPROGMANClick on 'Change' to select default PDF handler.pdf Properties#32770Click on 'Change' to select default PDF handler Properties#32770Click on 'Change' to select default PDF handler#32770Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\UserChoiceSoftware\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\UserChoiceSoftware\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdfApplicationSOFTWARE\Adobe\Adobe Acrobat\{A6EADE66-0000-0000-484E-7E8A45000000}SOFTWARE\Adobe\Acrobat Reader\{AC76BA86-0000-0000-7761-7E8A45000000}{AC76BA86-0000-0000-7760-7E8A45000000}SOFTWARE\Adobe\Adobe Acrobat\SOFTWARE\Adobe\Adobe Acrobat\{AC76BA86-0000-0000-BA7E-7E8A45000000}VersionMajorVersionMinor12VersionStringInstalledProductNameAdobe AcrobatreaderSOFTWARE\Adobe\Adobe Acrobat\SOFTWARE\Wow6432Node\Adobe\Acrobat Reader\SOFTWARE\Wow6432Node\Adobe\Adobe Acrobat\SOFTWARE\Adobe\Acrobat Reader\.0\InstallerPATHVersionMajorVersionMinor1207760-BA7E-7AD7-VersionStringInstalledProductNameAdobe AcrobatreaderSOFTWARE\Adobe\Adobe Acrobat\SOFTWARE\Wow6432Node\Adobe\Acrobat Reader\SOFTWARE\Wow6432Node\Adobe\Adobe Acrobat\SOFTWARE\Adobe\Acrobat Reader\.0DC\InstallerENU_GUIDPATHInstallLocationAcrobat.Document.DC.pdfTrunk{AC76BA86-0000-0000-7760-7E8A45000000}BetaDCVersionMajorSOFTWARE\Google\Chrome\SOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkajSOFTWARE\Google\Chrome\NativeMessagingHosts\com.adobe.acrobat.chrome_webcapturehttps://clients2.google.com/service/update2/crxupdate_urlBrowser\WCChromeExtn\manifest.jsonAcrobat.Document.SOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkajAcrobat.Document.11.pdfSOFTWARE\Google\Chrome\NativeMessagingHosts\.com.adobe.acrobat.chrome_webcaptureSOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkaj{AC76BA86-0000-0000-7760-7E8A45000000}VersionMajorLowerCoExVersionSOFTWARE\Adobe\Adobe Acrobat\DC\InstallerCoExRepairDone\RDCNotificationAppx\ADCNotificationAppx\NotificationAppxSOFTWARE\Adobe\Adobe Acrobat\\DC\SOFTWARE\Adobe\Adobe Acrobat\\DC\Installer\AppVersionAppVersionINSTALLUWPAPP=1 REINSTALLMODE=omus DISABLE_FIU_CHECK=1 IGNOREAAM=1 REPAIRFROMAPP=1 IS_COEX_REPAIR=1 /qn/i msiexec.exe/i AppDoNotTakePDFOwnershipAtLaunch ADD_ALL_DICT=1 REINSTALL=AdobeCommonLinguistics SKIP_WEBRCS_REINSTALL=1 SKIP_CEF_KILL=1 /qnmsiexec.exeAppDoNotTakePDFOwnershipAtLaunchWin10DisableOwnershipPrompt.pdf.pdfxml.acrobatsecuritysettings.fdf.xfdf.xdp.pdx.api.secstore.sequ.rmf.bpdxAdobe Acrobat XI ProRtlGetVersionntdll.dll\??\UNC\\\\\?\UNC\\Device\Mup\\Device\LanmanRedirector\\Dev
    Source: MSBuild.exe, 00000001.00000002.629865892.0000000000F27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managery
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exeCode function: 0_2_00302DE3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000001.00000002.630789913.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000001.00000002.630789913.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: MSBuild.exe, 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: znytpstdcrwsisx.exe, 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: znytpstdcrwsisx.exe, 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: MSBuild.exe, 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ec7f8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.145bb50.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.4209c8e.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f0000.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.42130ed.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.16ecf40.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1196210.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.1428f48.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.147e008.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.MSBuild.exe.59f4629.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 7.2.MSBuild.exe.420eac4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.3.znytpstdcrwsisx.exe.14568c0.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.14183d8.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.13db7e0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.3.Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe.11c1e50.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe PID: 7044, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5980, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: znytpstdcrwsisx.exe PID: 5292, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5944, type: MEMORYSTR
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0502260A bind,
    Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_050225B8 bind,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Command and Scripting Interpreter
    1
    Scheduled Task/Job
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    1
    System Time Discovery
    Remote Services11
    Input Capture
    Exfiltration Over Other Network Medium12
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    2
    Registry Run Keys / Startup Folder
    312
    Process Injection
    1
    Disable or Modify Tools
    LSASS Memory21
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Remote Access Software
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)1
    Scheduled Task/Job
    21
    Virtualization/Sandbox Evasion
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)2
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    NTDS21
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script312
    Process Injection
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingData Transfer Size Limits22
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Deobfuscate/Decode Files or Information
    Cached Domain Credentials14
    System Information Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 881372 Sample: Backdoor.MSIL.NanoBot.betf-... Startdate: 04/06/2023 Architecture: WINDOWS Score: 100 41 Snort IDS alert for network traffic 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 12 other signatures 2->47 8 Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe 5 2->8         started        12 znytpstdcrwsisx.exe 2->12         started        14 MSBuild.exe 4 2->14         started        process3 file4 33 C:\Users\user\AppData\...\znytpstdcrwsisx.exe, PE32 8->33 dropped 35 C:\Users\user\...\znytpstdcrwsisx.fr.url, Generic 8->35 dropped 51 Writes to foreign memory regions 8->51 53 Allocates memory in foreign processes 8->53 55 Injects a PE file into a foreign processes 8->55 16 MSBuild.exe 10 8->16         started        57 Antivirus detection for dropped file 12->57 59 Multi AV Scanner detection for dropped file 12->59 21 MSBuild.exe 2 12->21         started        23 conhost.exe 14->23         started        signatures5 process6 dnsIp7 37 nickdns22.duckdns.org 192.169.69.26, 1896, 49699, 49700 WOWUS United States 16->37 39 127.0.0.1 unknown unknown 16->39 29 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 16->29 dropped 31 C:\Users\user\AppData\Local\...\tmp9A5C.tmp, XML 16->31 dropped 49 Uses schtasks.exe or at.exe to add and modify task schedules 16->49 25 schtasks.exe 1 16->25         started        file8 signatures9 process10 process11 27 conhost.exe 25->27         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe70%ReversingLabsWin32.Trojan.Nymeria
    Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe65%VirustotalBrowse
    Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe100%AviraDR/AutoIt.Gen8
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe100%AviraDR/AutoIt.Gen8
    C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe81%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
    No Antivirus matches
    SourceDetectionScannerLabelLink
    nickdns22.duckdns.org2%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.sysinternals.comopenThe0%URL Reputationsafe
    nickdns22.duckdns.org0%Avira URL Cloudsafe
    nickdns22.duckdns.org2%VirustotalBrowse
    http://www.sysinternals.comFileVersionLegalCopyrightLISTBOXDEL:AllUsersuserComputerscomputerGroupsgr0%Avira URL Cloudsafe
    https://rrchnm.org/0%VirustotalBrowse
    https://rrchnm.org/0%Avira URL Cloudsafe
    http://www.sysinternals.comopenConnection0%Avira URL Cloudsafe
    http://www.sysinternals.comWindowPositionSOFTWARE0%Avira URL Cloudsafe
    https://www.virustotal.comPOST4e3202fdbe953d628f650229af5b3eb49cd46b2d3bfe5546ae3c5fa48b554e0capikey0%Avira URL Cloudsafe
    https://www.sysinternals.comntdllRtlInitUnicodeStringNtOpenDirectoryObjectNtQuerySectionNtQueryDirec0%Avira URL Cloudsafe
    http://www.sysinternals.comFileVersionLegalCopyright0%Avira URL Cloudsafe
    127.0.0.10%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    nickdns22.duckdns.org
    192.169.69.26
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    nickdns22.duckdns.orgtrue
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.zotero.org/znytpstdcrwsisx.exe.0.drfalse
      high
      https://ims-prod06.adobelogin.comBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://crashpad.chromium.org/Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
          high
          https://ims-na1-stg1.adobelogin.comBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.mendeley.com?dgcid=Mendeley_Desktop_Help-menu-websiteBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
              high
              https://service.elsevier.com/app/home/supporthub/mendeley/?dgcid=Mendeley_Desktop_Help-menu-FAQBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                high
                https://crashpad.chromium.org/bug/newBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                  high
                  https://www.gmu.edu/znytpstdcrwsisx.exe.0.drfalse
                    high
                    https://csl.mendeley.comBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                      high
                      http://www.sysinternals.comBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://support.mendeley.com/customer/portal/articles/227955Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                          high
                          https://www.elsevier.com/legal/privacy-policyznytpstdcrwsisx.exe.0.drfalse
                            high
                            https://www.virustotal.com/about/terms-of-service%sBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.sysinternals.comopenTheBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://crashpad.chromium.org/https://crashpad.chromium.org/bug/newBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                high
                                https://rrchnm.org/znytpstdcrwsisx.exe.0.drfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://creativecommons.org/licenses/by-sa/3.0/Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                  high
                                  http://www.sysinternals.comFileVersionLegalCopyrightLISTBOXDEL:AllUsersuserComputerscomputerGroupsgrBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                  • Avira URL Cloud: safe
                                  low
                                  https://service.elsevier.com/app/answers/detail/a_id/19611/kw/duplicates/supporthub/mendeley/YesBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                    high
                                    https://www.elsevier.com/legal/elsevier-website-terms-and-conditionsznytpstdcrwsisx.exe.0.drfalse
                                      high
                                      https://www.mendeley.com/guides?dgcid=Mendeley_Desktop_Help-menu-Help-guidesBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                        high
                                        https://clients2.google.com/service/update2/crxupdate_urlBrowserBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://p.yusukekamiyamane.com/Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                            high
                                            https://github.com/Juris-M/citeproc-jsznytpstdcrwsisx.exe.0.drfalse
                                              high
                                              http://www.sysinternals.comWindowPositionSOFTWAREBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.364770823.0000000004CB8000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://service.elsevier.com/app/contact/supporthub/mendeley?dgcid=Mendeley_Desktop_Help-menu-ContacBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                high
                                                https://plasma.kde.orgBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                  high
                                                  https://www.mendeley.com/libraryznytpstdcrwsisx.exe.0.drfalse
                                                    high
                                                    https://www.virustotal.com/en/about/terms-of-service/Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.mendeley.com/guides?dgcid=Mendeley_Desktop_Help-menu-Help-guideshttps://www.mendeley.comBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                        high
                                                        http://citationstyles.org/Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                          high
                                                          http://www.sysinternals.comopenConnectionBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://github.com/citation-style-language/stylesBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                            high
                                                            https://www.virustotal.comPOST4e3202fdbe953d628f650229af5b3eb49cd46b2d3bfe5546ae3c5fa48b554e0capikeyBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.sysinternals.comntdllRtlInitUnicodeStringNtOpenDirectoryObjectNtQuerySectionNtQueryDirecBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.sysinternals.comFileVersionLegalCopyrightBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.378236827.0000000005691000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.366011372.0000000005469000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.365309489.0000000004823000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.372536607.0000000004A39000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.374414583.00000000053CA000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.368183823.0000000004C32000.00000004.00000020.00020000.00000000.sdmp, Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, 00000000.00000003.369979852.0000000005DF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://citationstyles.orgBackdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe, znytpstdcrwsisx.exe.0.drfalse
                                                              high
                                                              https://service.elsevier.com/app/answers/detail/a_id/22094/kw/migrate/supporthub/mendeley/znytpstdcrwsisx.exe.0.drfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                192.169.69.26
                                                                nickdns22.duckdns.orgUnited States
                                                                23033WOWUStrue
                                                                IP
                                                                127.0.0.1
                                                                Joe Sandbox Version:37.1.0 Beryl
                                                                Analysis ID:881372
                                                                Start date and time:2023-06-04 11:26:07 +02:00
                                                                Joe Sandbox Product:CloudBasic
                                                                Overall analysis duration:0h 8m 56s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:light
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                Number of analysed new started processes analysed:12
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • HDC enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample file name:Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.expl.evad.winEXE@11/9@12/2
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HDC Information:
                                                                • Successful, ratio: 20% (good quality ratio 20%)
                                                                • Quality average: 95.5%
                                                                • Quality standard deviation: 4.5%
                                                                HCA Information:Failed
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe
                                                                • TCP Packets have been reduced to 100
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                TimeTypeDescription
                                                                11:27:12AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.url
                                                                11:27:13API Interceptor834x Sleep call for process: MSBuild.exe modified
                                                                11:27:15Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):325
                                                                Entropy (8bit):5.334380084018418
                                                                Encrypted:false
                                                                SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                                                                MD5:65CE98936A67552310EFE2F0FF5BDF88
                                                                SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                                                                SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                                                                SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                Process:C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):207872
                                                                Entropy (8bit):7.999050560075495
                                                                Encrypted:true
                                                                SSDEEP:6144:yfHioBK/DQ0vgnZ92J6yN8n59mrjuydK/znla5oC:yfOjvgb2JpNeorjOznA5oC
                                                                MD5:D63A88D1A1B8198E665C1094E96488BC
                                                                SHA1:427EA9EB92C1C20B647CECD78C6085B509BCC326
                                                                SHA-256:68B951C18FA6D7FDD30A5EB01609BAB36677D1414A6EC2D5A25C327A7D7CB9B0
                                                                SHA-512:9C79A3F8E506447F6B5D24E27CED80E4EE449245D3483741EBD27E89656423B0ABDE9AE8ADBEAB430566999E86E3E70A8FECB6FE7F515F327066FF42E7A9E236
                                                                Malicious:false
                                                                Preview:z.(+...!........;.N.......E............q..B....5.UTtw.Sf..aE.j.Ix.Tq....9..8w.PxA...*.-...xA&..'..mX........9.My..M-.2V0....,...M..q.....v...._..T67b5.Jb.S..Q!QQ..(ni....J..Y&..z..gj5...jH..G......s.7...0...u.AL......$....Y...S...i.....WJ.t.=......R..@...O2..sf.XQ......3.z....NQl.h....X .....:d.O.....1N...i6..EU..J8.....V.{.c.F..............A..C[....m...E..N..PZ.......{H..e~..I.......7..%..o .M+.B..~..../\Y=s..JX@.....*f..s&..3..1Y..._:...c/......Tc.../A..>n.F.../.Z.U.i......}...+..i4\....Z#.....&.JD.."O.?.ou(u4%b..O..Tm.y.n...{.........t.~w?.0.3.Bx..)....e.-.][. ...QeH.n.....vM........m...RE..../(N.....H.up}.....v..l..ey.o.((O..#s.I.LX...j..9)...X.h..$%Vk.........ta_.~.....2V..X.@o..R.....`[.T...,.O..Q.H......s.C...J.w.......q.....wr...N.'W.r.;."jo.Z....?....z.....b.w.D..b|...@......N;....^L....2..nx..-...~.+@....C.....A./6GJ.t..g.s.MA.R...rh.......1..*4.B..)...........V.HM..AB....zJ.`|`...g....iwOd..Q..B..F.s.7.WS.-.@...6...l...j.a]U..-"!".!.
                                                                Process:C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):207872
                                                                Entropy (8bit):7.999050560075495
                                                                Encrypted:true
                                                                SSDEEP:6144:yfHioBK/DQ0vgnZ92J6yN8n59mrjuydK/znla5oC:yfOjvgb2JpNeorjOznA5oC
                                                                MD5:D63A88D1A1B8198E665C1094E96488BC
                                                                SHA1:427EA9EB92C1C20B647CECD78C6085B509BCC326
                                                                SHA-256:68B951C18FA6D7FDD30A5EB01609BAB36677D1414A6EC2D5A25C327A7D7CB9B0
                                                                SHA-512:9C79A3F8E506447F6B5D24E27CED80E4EE449245D3483741EBD27E89656423B0ABDE9AE8ADBEAB430566999E86E3E70A8FECB6FE7F515F327066FF42E7A9E236
                                                                Malicious:false
                                                                Preview:z.(+...!........;.N.......E............q..B....5.UTtw.Sf..aE.j.Ix.Tq....9..8w.PxA...*.-...xA&..'..mX........9.My..M-.2V0....,...M..q.....v...._..T67b5.Jb.S..Q!QQ..(ni....J..Y&..z..gj5...jH..G......s.7...0...u.AL......$....Y...S...i.....WJ.t.=......R..@...O2..sf.XQ......3.z....NQl.h....X .....:d.O.....1N...i6..EU..J8.....V.{.c.F..............A..C[....m...E..N..PZ.......{H..e~..I.......7..%..o .M+.B..~..../\Y=s..JX@.....*f..s&..3..1Y..._:...c/......Tc.../A..>n.F.../.Z.U.i......}...+..i4\....Z#.....&.JD.."O.?.ou(u4%b..O..Tm.y.n...{.........t.~w?.0.3.Bx..)....e.-.][. ...QeH.n.....vM........m...RE..../(N.....H.up}.....v..l..ey.o.((O..#s.I.LX...j..9)...X.h..$%Vk.........ta_.~.....2V..X.@o..R.....`[.T...,.O..Q.H......s.C...J.w.......q.....wr...N.'W.r.;."jo.Z....?....z.....b.w.D..b|...@......N;....^L....2..nx..-...~.+@....C.....A./6GJ.t..g.s.MA.R...rh.......1..*4.B..)...........V.HM..AB....zJ.`|`...g....iwOd..Q..B..F.s.7.WS.-.@...6...l...j.a]U..-"!".!.
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1320
                                                                Entropy (8bit):5.136963558289723
                                                                Encrypted:false
                                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                                                                MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                                                                SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                                                                SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                                                                SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                                                                Malicious:true
                                                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):2.75
                                                                Encrypted:false
                                                                SSDEEP:3:a0Qn:/Qn
                                                                MD5:0E18C253EB33804FAEB60D95384CE28F
                                                                SHA1:5265FBE488A3AAB00CE74A325B5D6CA465A55142
                                                                SHA-256:ADDCC29B2ABC88AC2C25A4F28879604E2F1CF0104A7A1CF6E0B16528FB50183F
                                                                SHA-512:00D7DEE5D4A845629844DE6A41E373247524C8E187CF05C2B7AE3570C1DA2BC4E9E1892C90EE6F52399858406D6202C0929CBD3F35AC9A855EB7D84EE3FD6503
                                                                Malicious:true
                                                                Preview:..)Q)e.H
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):57
                                                                Entropy (8bit):4.85263908467479
                                                                Encrypted:false
                                                                SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                                                                MD5:A35128E4E28B27328F70E4E8FF482443
                                                                SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                                                                SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                                                                SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                                                                Malicious:false
                                                                Preview:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Process:C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                File Type:Generic INItialization configuration [InternetShortcut]
                                                                Category:modified
                                                                Size (bytes):186
                                                                Entropy (8bit):4.970025311868907
                                                                Encrypted:false
                                                                SSDEEP:3:HRAbABGQYm5uOWXp5cViEaKC5D9c6AQI6ABGQYm5uOWXp5cViEaKC5D9c6AQA:HRYFVmwOWXp+NaZ5D+1YFVmwOWXp+Nay
                                                                MD5:AC58C72B816D89CF6D82C181DF3FCD1C
                                                                SHA1:ED37DDAD70163D899BF6DD12DBE4B839E147AE0A
                                                                SHA-256:2B28DEC4AEE449EF1FD1FEC9E7C9CB29D967868CCFBD41E9CB1939DA8A202A7F
                                                                SHA-512:0DD626181E2074E41D1FD55FF153DBD843D06B992B2CABB2B8ADB4DBDE0C993C915F2CDB45A362E5BC90751B015045E27725D09707D54DBEF344189954B45000
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: Methodology_Suspicious_Shortcut_Local_URL, Description: Detects local script usage for .URL persistence, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\znytpstdcrwsisx.fr.url, Author: @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
                                                                Preview:[InternetShortcut]..URL=file:///C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe[InternetShortcut]..URL=file:///C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe
                                                                Process:C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):4967954
                                                                Entropy (8bit):5.837705465010447
                                                                Encrypted:false
                                                                SSDEEP:49152:RVg5tQ7aoFsGabuKxN5GmoZgZh8Jjf1SXAEaYD:fg56ddKPo2
                                                                MD5:A360B0402DD16AE837F59D09E1BF3B3C
                                                                SHA1:F62C60788659D8EAD3AAB08A752C02F270CF8CCD
                                                                SHA-256:490AD4D568CF15F2B6BAFE80BEC8857CFD0680DD7FB65F352D6CC9DF9DCF5342
                                                                SHA-512:2FA747F6AE259AF35521C0DAAD99059C3C0A726064C030579B3736C017A64C11CA015AACA2B5BBB6887341859833831D71DDB54A402099E7FA3B8EB24A6BC56F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 81%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d...........'.a....H.k....H.h.....H.i....}%....}5............~.......k......o.....1......j....Rich....................PE..L.H..2.[.........."..........&......t_............@...........................M.....[.....@...@.......@......................p..|....@...O......................Ll..................................0'..@...............`............................text...O............|.............. ..`.rdata..B............2..............@..@.data...T........b..................@....rsrc....O...@...P...b..............@..@.reloc..t...........................@..BeSkkNGPG.y...@...z...X..................PTcLNQBR^...............................uhxZiqpZ.w...p...x......................bMgQsjaV................................GBMbimfi................................DgfAMsww.n.......p......................rSvCgsmi................................YskjstAT
                                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):235
                                                                Entropy (8bit):5.107306146099542
                                                                Encrypted:false
                                                                SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFPRAgRYan:zK1XnV30ZsGMIG9BFRbQ5AUYan
                                                                MD5:67DDD8252A246E7B14649B0063E351C0
                                                                SHA1:AAE1C6839D1CC4A626D0FB2D4773823AD209FA17
                                                                SHA-256:24C8283BA3F7FCA2E4CEF6F141263DD1E8A36E5A5CD96A97BFE83525D7663116
                                                                SHA-512:326A5E0A440F60D4808C91499F1F3616C496B67DC053B4A2A40B0FE09002074AE5365018781F8746E98E7E3CFCD35F1310D17FB7C2138A8157318E6791987025
                                                                Malicious:false
                                                                Preview:Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1009: Project file does not exist...Switch: 0..
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):5.837703338237122
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 96.49%
                                                                • DirectShow filter (201580/2) 1.94%
                                                                • Windows ActiveX control (116523/4) 1.12%
                                                                • Win32 EXE PECompact compressed (generic) (41571/9) 0.40%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                File name:Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                File size:4967948
                                                                MD5:d2c96c075741ccd8bed558e39838a59d
                                                                SHA1:09667b1bef10f69697d997a26d9d963dfe4bdeb3
                                                                SHA256:d2a573edc893e24fbf245c4f8f918ec3b4f04fab928f073a24da3cb741d18388
                                                                SHA512:cd882b512f98c72793b46a160feab5a7efa432a180a29f05fceabd6677d7791e9f64fa43246acd774a37439845203d0113ec1737a8e8118c9ed1ee35fb40d323
                                                                SSDEEP:49152:RVg5tQ7aoFsGabuKxN5GmoZgZh8Jjf1SXAEaY7:fg56ddKPo2
                                                                TLSH:5636051273F90556F2F36B31ADB191555F3ABDA99AF2D62E3240024E0976A40FE31B33
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                                Icon Hash:3f894c353f383a38
                                                                Entrypoint:0x425f74
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x5BAE3218 [Fri Sep 28 13:52:24 2018 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                                Instruction
                                                                call 00007F11D5288ACFh
                                                                jmp 00007F11D527BAE4h
                                                                int3
                                                                int3
                                                                push edi
                                                                push esi
                                                                mov esi, dword ptr [esp+10h]
                                                                mov ecx, dword ptr [esp+14h]
                                                                mov edi, dword ptr [esp+0Ch]
                                                                mov eax, ecx
                                                                mov edx, ecx
                                                                add eax, esi
                                                                cmp edi, esi
                                                                jbe 00007F11D527BC6Ah
                                                                cmp edi, eax
                                                                jc 00007F11D527BFCEh
                                                                bt dword ptr [004C0158h], 01h
                                                                jnc 00007F11D527BC69h
                                                                rep movsb
                                                                jmp 00007F11D527BF7Ch
                                                                cmp ecx, 00000080h
                                                                jc 00007F11D527BE34h
                                                                mov eax, edi
                                                                xor eax, esi
                                                                test eax, 0000000Fh
                                                                jne 00007F11D527BC70h
                                                                bt dword ptr [004BA370h], 01h
                                                                jc 00007F11D527C140h
                                                                bt dword ptr [004C0158h], 00000000h
                                                                jnc 00007F11D527BE0Dh
                                                                test edi, 00000003h
                                                                jne 00007F11D527BE1Eh
                                                                test esi, 00000003h
                                                                jne 00007F11D527BDFDh
                                                                bt edi, 02h
                                                                jnc 00007F11D527BC6Fh
                                                                mov eax, dword ptr [esi]
                                                                sub ecx, 04h
                                                                lea esi, dword ptr [esi+04h]
                                                                mov dword ptr [edi], eax
                                                                lea edi, dword ptr [edi+04h]
                                                                bt edi, 03h
                                                                jnc 00007F11D527BC73h
                                                                movq xmm1, qword ptr [esi]
                                                                sub ecx, 08h
                                                                lea esi, dword ptr [esi+08h]
                                                                movq qword ptr [edi], xmm1
                                                                lea edi, dword ptr [edi+08h]
                                                                test esi, 00000007h
                                                                je 00007F11D527BCC5h
                                                                bt esi, 03h
                                                                jnc 00007F11D527BD18h
                                                                movdqa xmm1, dqword ptr [esi+00h]
                                                                Programming Language:
                                                                • [ C ] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 SP1 build 30729
                                                                • [ASM] VS2012 UPD4 build 61030
                                                                • [RES] VS2012 UPD4 build 61030
                                                                • [LNK] VS2012 UPD4 build 61030
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x54f80.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1190000x6c4c.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x8b54f0x8b600False0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x8d0000x2cc420x2ce00False0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xba0000x9d540x6200False0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0xc40000x54f800x55000False0.9236299402573529data7.805489545240979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x1190000xa4740xa600False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                eSkkNGPG0x1240000x79ad0x7a00False0.35098616803278687data4.535518130136907
                                                                PTcLNQBR0x12c0000xaf5e0xb000False0.43363813920454547data5.356692905431131
                                                                uhxZiqpZ0x1370000x778b0x7800False0.3194986979166667data4.3334565362895985
                                                                bMgQsjaV0x13f0000x3fc8f0x3fe00False0.24984711350293543data4.05145736763233
                                                                GBMbimfi0x17f0000xa7190xa800False0.4670293898809524data5.242631553298864
                                                                DgfAMsww0x18a0000x16e170x17000False0.29977284307065216data4.933275518369312
                                                                rSvCgsmi0x1a10000xec40x1000False0.44287109375data5.224668348563421
                                                                YskjstAT0x1a20000xc35e0xc400False0.4137436224489796data4.976696158252635
                                                                LoVCKuYF0x1af0000x135670x13600False0.3956023185483871data4.838724782349081
                                                                WVocwQqb0x1c30000x2da880x2dc00False0.26286074112021857data4.978337116946978
                                                                oSCGvaQZ0x1f10000x1a950x1c00False0.22140066964285715data2.893264792435353
                                                                yZjSVOZX0x1f30000xeaa0x1000False0.4404296875data5.471251398155905
                                                                QXbsjhZl0x1f40000x56ab0x5800False0.3450372869318182data4.563138313410933
                                                                yyMCijkk0x1fa0000x240a0x2600False0.3959703947368421data5.108896911843352
                                                                mpFeMMWO0x1fd0000x39830x3a00False0.20480872844827586SysEx File -4.340130743432657
                                                                lykrKTJc0x2010000x63640x6400False0.2933984375data4.674033826538105
                                                                uiehIGyj0x2080000x27a0x400False0.310546875data2.456558757278845
                                                                zVFOZMAw0x2090000x601d50x60200False0.29784521293888166data5.856604686192216
                                                                YlpJAimU0x26a0000x5ab50x5c00False0.35597826086956524data5.271103031571286
                                                                JwzqdXdu0x2700000x14bf00x14c00False0.3460913968373494data4.477563975249695
                                                                UGiiFcPP0x2850000x7aa40x7c00False0.3504284274193548data4.508458694566567
                                                                WQbVwRsn0x28d0000x14b8e0x14c00False0.16732163027108435data3.70717026919471
                                                                tPcESPxm0x2a20000xadc50xae00False0.38873922413793105data4.905327698141381
                                                                aJkBpZiD0x2ad0000x6b650x6c00False0.3318504050925926data4.392601916452199
                                                                oVRlQlUl0x2b40000x6fc20x7000False0.33461216517857145data4.387432855547406
                                                                kJDrTOOv0x2bb0000x83ee0x8400False0.32359730113636365data4.337865742001504
                                                                dPNhZlJs0x2c40000x55640x5600False0.32980559593023256data4.4462925278137835
                                                                tpgvdaSU0x2ca0000xaa2d0xac00False0.395008175872093data5.184872625976529
                                                                stGTwKsk0x2d50000x1a50x200False0.46484375data3.5685468265164313
                                                                NWtntEHY0x2d60000x3b290x3c00False0.3858723958333333data4.867479033195617
                                                                SeCKBtus0x2da0000x35490x3600False0.5189525462962963data5.681334906237916
                                                                YLnRofwZ0x2de0000x1d0760x1d200False0.33267670332618027data4.731011954937073
                                                                ITlNviCX0x2fc0000x1fd30x2000False0.414794921875data5.360679897144668
                                                                xXKSfIFI0x2fe0000xa5fb0xa600False0.39780214608433734data5.050269524194634
                                                                rzHoctSy0x3090000x10100x1200False0.4262152777777778data5.038816754642175
                                                                tqGkaUrY0x30b0000x618f0x6200False0.32067123724489793DIY-Thermocam raw data (Lepton 2.x), scale 25973-29230, spot sensor temperature 4465277526996217788032159318016.000000, unit celsius, color scheme 0, calibration: offset 144115188075855872.000000, slope 17884532710627128377344.0000004.335120538803027
                                                                XUULAqjj0x3120000x37ff0x3800False0.4321986607142857data5.362762787611382
                                                                OJKanVIF0x3160000x216340x21800False0.30387855643656714data4.277314480562102
                                                                XOKAQdyM0x3380000x1864d0x18800False0.3765345982142857data5.080509846456985
                                                                bvHwouBZ0x3510000xa2b00xa400False0.2437595274390244data4.199028080121188
                                                                emfUrPdE0x35c0000xe7e30xe800False0.40808526400862066data5.094889583938427
                                                                wDjKtsMK0x36b0000x35eaa0x36000False0.19294795283564814data3.3645037945584124
                                                                mVRJZClE0x3a10000xecf30xee00False0.40045627626050423data4.849352362005015
                                                                tOofDbnU0x3b00000xa8920xaa00False0.4192325367647059data4.961370398375378
                                                                jMZzwYXU0x3bb0000x4cf70x4e00False0.49368990384615385data5.31897065544915
                                                                nBeILfXx0x3c00000x93720x9400False0.3332717483108108data4.3261187170092255
                                                                vXOIjvTV0x3ca0000x35cb0x3600False0.6312210648148148data6.633589844178363
                                                                HdeHlMsv0x3ce0000x89bc0x8a00False0.3580446105072464data4.550960204952043
                                                                INgZfirH0x3d70000xe5930xe600False0.32138247282608695data4.937237493219116
                                                                kDTxXhPW0x3e60000x1430x200False0.388671875data2.309414250359407
                                                                WGoHkNIX0x3e70000xf270x1000False0.4541015625data5.223482856241876
                                                                KQZwnOJl0x3e80000xd7fc0xd800False0.46073857060185186DIY-Thermocam raw data (Lepton 3.x), scale 11520-12544, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 147573952589676412928.000000, slope 9704463122297120914145280.0000005.127740862936039
                                                                TIucAObT0x3f60000x6cd50x6e00False0.4237926136363636data5.240262688404368
                                                                LbFXKCFw0x3fd0000xc78b0xc800False0.37185546875data4.6714439388315085
                                                                zVPYqkoM0x40a0000xb1560xb200False0.39786692415730335data5.027793035702181
                                                                FueMosXg0x4160000x4c2a0x4e00False0.3350360576923077data4.519752982476082
                                                                iRDivbUE0x41b0000xc1e0xe00False0.4263392857142857data5.114047767058862
                                                                qqDFgVrq0x41c0000x56ee0x5800False0.21666370738636365data3.357912782144656
                                                                NoZwckKd0x4220000xb4660xb600False0.35561899038461536data4.609491392908207
                                                                xegiIWpk0x42e0000x3b10x400False0.466796875data3.5123040032137434
                                                                lFLuySNA0x42f0000x9c9c0x9e00False0.41836431962025317data4.809466543354873
                                                                yfUTtHPf0x4390000x7dc0x800False0.39599609375data4.148816820068358
                                                                HFrIlBYb0x43a0000x11bd0x1200False0.4587673611111111data5.275938366031744
                                                                NCFRXlWT0x43c0000x20380x2200False0.30652573529411764data3.70753335612539
                                                                DOngBUEn0x43f0000x921b40x92200False0.28899734014114625data5.578060697455509
                                                                XkEBteUo0x4d20000x511e0x5200False0.3346512957317073data4.507233992378509
                                                                JfnpBUQQ0x4d80000x16770x1800False0.3590494791666667data3.8394132116328463
                                                                NameRVASizeTypeLanguageCountry
                                                                RT_ICON0xc45900x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain
                                                                RT_ICON0xc46b80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain
                                                                RT_ICON0xc4d200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain
                                                                RT_ICON0xc50080x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishGreat Britain
                                                                RT_ICON0xc51f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain
                                                                RT_ICON0xc53180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain
                                                                RT_ICON0xc61c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain
                                                                RT_ICON0xc6a680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishGreat Britain
                                                                RT_ICON0xc71300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain
                                                                RT_ICON0xc76980xabb6PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain
                                                                RT_ICON0xd22500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain
                                                                RT_ICON0xd47f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain
                                                                RT_ICON0xd58a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishGreat Britain
                                                                RT_ICON0xd62280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain
                                                                RT_STRING0xd66900x594dataEnglishGreat Britain
                                                                RT_STRING0xd6c240x68adataEnglishGreat Britain
                                                                RT_STRING0xd72b00x490dataEnglishGreat Britain
                                                                RT_STRING0xd77400x5fcdataEnglishGreat Britain
                                                                RT_STRING0xd7d3c0x65cdataEnglishGreat Britain
                                                                RT_STRING0xd83980x466dataEnglishGreat Britain
                                                                RT_STRING0xd88000x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain
                                                                RT_RCDATA0xd89580x400cbdata
                                                                RT_GROUP_ICON0x118a240xbcdataEnglishGreat Britain
                                                                RT_GROUP_ICON0x118ae00x14dataEnglishGreat Britain
                                                                RT_VERSION0x118af40xdcdataEnglishGreat Britain
                                                                RT_MANIFEST0x118bd00x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain
                                                                DLLImport
                                                                WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                                MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                                UxTheme.dllIsThemeActive
                                                                KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                                USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                                GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                                SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishGreat Britain
                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                192.168.2.3192.169.69.264971118962025019 06/04/23-11:28:18.475887TCP2025019ET TROJAN Possible NanoCore C2 60B497111896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264971718962025019 06/04/23-11:28:50.523433TCP2025019ET TROJAN Possible NanoCore C2 60B497171896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264970718962025019 06/04/23-11:27:57.173727TCP2025019ET TROJAN Possible NanoCore C2 60B497071896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264971218962025019 06/04/23-11:28:23.420896TCP2025019ET TROJAN Possible NanoCore C2 60B497121896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264971318962025019 06/04/23-11:28:28.432846TCP2025019ET TROJAN Possible NanoCore C2 60B497131896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264971918962025019 06/04/23-11:29:00.977409TCP2025019ET TROJAN Possible NanoCore C2 60B497191896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264971818962025019 06/04/23-11:28:55.916794TCP2025019ET TROJAN Possible NanoCore C2 60B497181896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264970518962025019 06/04/23-11:27:45.907549TCP2025019ET TROJAN Possible NanoCore C2 60B497051896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264969918962025019 06/04/23-11:27:14.981963TCP2025019ET TROJAN Possible NanoCore C2 60B496991896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264970618962025019 06/04/23-11:27:50.915043TCP2025019ET TROJAN Possible NanoCore C2 60B497061896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264970118962025019 06/04/23-11:27:25.413836TCP2025019ET TROJAN Possible NanoCore C2 60B497011896192.168.2.3192.169.69.26
                                                                192.168.2.3192.169.69.264970018962025019 06/04/23-11:27:20.405611TCP2025019ET TROJAN Possible NanoCore C2 60B497001896192.168.2.3192.169.69.26
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jun 4, 2023 11:27:00.324069023 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.324297905 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.324374914 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.324446917 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.324493885 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.324533939 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.335150003 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.335196972 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.335339069 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.335508108 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.335681915 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.335861921 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336209059 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336437941 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336488008 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336636066 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336671114 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336865902 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.336981058 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.337177038 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.337305069 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.337481022 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.337692976 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.337846041 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.337924004 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338171959 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338228941 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338363886 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338484049 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338557005 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338663101 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.338768005 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.351888895 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.351933956 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.351989031 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.352036953 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.352076054 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.352104902 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.352109909 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.352188110 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.352188110 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.352353096 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.352416039 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.352447987 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.363018990 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363064051 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363219023 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363254070 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363403082 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363518000 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363564968 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363723993 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363903999 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363944054 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.363975048 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.364007950 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.364041090 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.364073992 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.364099979 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.364104986 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.364187002 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.364187002 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:00.461503029 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.461559057 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:00.461791992 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:14.639772892 CEST496991896192.168.2.3192.169.69.26
                                                                Jun 4, 2023 11:27:14.913640022 CEST189649699192.169.69.26192.168.2.3
                                                                Jun 4, 2023 11:27:14.914050102 CEST496991896192.168.2.3192.169.69.26
                                                                Jun 4, 2023 11:27:14.981962919 CEST496991896192.168.2.3192.169.69.26
                                                                Jun 4, 2023 11:27:15.416867018 CEST189649699192.169.69.26192.168.2.3
                                                                Jun 4, 2023 11:27:19.842092991 CEST497001896192.168.2.3192.169.69.26
                                                                Jun 4, 2023 11:27:20.402514935 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:20.402683020 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:20.402740002 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:20.402806044 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:20.402849913 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:20.402873993 CEST49693443192.168.2.323.0.174.88
                                                                Jun 4, 2023 11:27:20.405004978 CEST189649700192.169.69.26192.168.2.3
                                                                Jun 4, 2023 11:27:20.405138016 CEST497001896192.168.2.3192.169.69.26
                                                                Jun 4, 2023 11:27:20.405611038 CEST497001896192.168.2.3192.169.69.26
                                                                Jun 4, 2023 11:27:20.413551092 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.413616896 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.413661957 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.413703918 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.413747072 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.413851976 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.413966894 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414011955 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414129019 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414172888 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414285898 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414411068 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414608955 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414654016 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414855957 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414886951 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.414913893 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.415009022 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.415081024 CEST4434969323.0.174.88192.168.2.3
                                                                Jun 4, 2023 11:27:20.415213108 CEST4434969323.0.174.88192.168.2.3
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jun 4, 2023 11:27:14.502774954 CEST5238753192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:27:14.624871969 CEST53523878.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:27:19.818093061 CEST5692453192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:27:19.838557959 CEST53569248.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:27:24.938667059 CEST6062553192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:27:25.060234070 CEST53606258.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:27:45.224785089 CEST4930253192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:27:45.338428020 CEST53493028.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:27:50.444329977 CEST5397553192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:27:50.467924118 CEST53539758.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:27:55.807750940 CEST5113953192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:27:55.828227997 CEST53511398.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:28:17.666209936 CEST5295553192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:28:17.780860901 CEST53529558.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:28:22.939152956 CEST6058253192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:28:23.062289953 CEST53605828.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:28:27.976121902 CEST5713453192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:28:28.098058939 CEST53571348.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:28:49.655924082 CEST6205053192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:28:49.769670963 CEST53620508.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:28:55.252490044 CEST5604253192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:28:55.282026052 CEST53560428.8.8.8192.168.2.3
                                                                Jun 4, 2023 11:29:00.458888054 CEST5963653192.168.2.38.8.8.8
                                                                Jun 4, 2023 11:29:00.487466097 CEST53596368.8.8.8192.168.2.3
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jun 4, 2023 11:27:14.502774954 CEST192.168.2.38.8.8.80x32deStandard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:19.818093061 CEST192.168.2.38.8.8.80xa211Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:24.938667059 CEST192.168.2.38.8.8.80xcb5Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:45.224785089 CEST192.168.2.38.8.8.80x72a6Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:50.444329977 CEST192.168.2.38.8.8.80x722dStandard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:55.807750940 CEST192.168.2.38.8.8.80xc7c8Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:17.666209936 CEST192.168.2.38.8.8.80x325aStandard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:22.939152956 CEST192.168.2.38.8.8.80x6307Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:27.976121902 CEST192.168.2.38.8.8.80x5504Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:49.655924082 CEST192.168.2.38.8.8.80xedcfStandard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:55.252490044 CEST192.168.2.38.8.8.80x59b1Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:29:00.458888054 CEST192.168.2.38.8.8.80x63f6Standard query (0)nickdns22.duckdns.orgA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jun 4, 2023 11:27:14.624871969 CEST8.8.8.8192.168.2.30x32deNo error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:19.838557959 CEST8.8.8.8192.168.2.30xa211No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:25.060234070 CEST8.8.8.8192.168.2.30xcb5No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:45.338428020 CEST8.8.8.8192.168.2.30x72a6No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:50.467924118 CEST8.8.8.8192.168.2.30x722dNo error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:27:55.828227997 CEST8.8.8.8192.168.2.30xc7c8No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:17.780860901 CEST8.8.8.8192.168.2.30x325aNo error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:23.062289953 CEST8.8.8.8192.168.2.30x6307No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:28.098058939 CEST8.8.8.8192.168.2.30x5504No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:49.769670963 CEST8.8.8.8192.168.2.30xedcfNo error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:28:55.282026052 CEST8.8.8.8192.168.2.30x59b1No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                Jun 4, 2023 11:29:00.487466097 CEST8.8.8.8192.168.2.30x63f6No error (0)nickdns22.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:11:27:01
                                                                Start date:04/06/2023
                                                                Path:C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\Backdoor.MSIL.NanoBot.betf-d2a573edc893e24fbf.exe
                                                                Imagebase:0x2d0000
                                                                File size:4967948 bytes
                                                                MD5 hash:D2C96C075741CCD8BED558E39838A59D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.383770715.00000000013B3000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.384143061.0000000001195000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.382325169.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.383002021.00000000014E4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.382620539.0000000001428000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.382379627.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.383032344.0000000004FF1000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.382518683.0000000001197000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.387268383.0000000001196000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.383592412.0000000001419000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.382557238.00000000013C2000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.383733827.00000000013E6000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.382477117.000000000145C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000003.383509738.000000000144C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:low

                                                                Target ID:1
                                                                Start time:11:27:11
                                                                Start date:04/06/2023
                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Imagebase:0x720000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.630789913.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.634788699.00000000059F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.634649068.0000000005640000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                Reputation:moderate

                                                                Target ID:2
                                                                Start time:11:27:13
                                                                Start date:04/06/2023
                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9A5C.tmp
                                                                Imagebase:0x3f0000
                                                                File size:185856 bytes
                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                Target ID:3
                                                                Start time:11:27:13
                                                                Start date:04/06/2023
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff745070000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                Target ID:4
                                                                Start time:11:27:15
                                                                Start date:04/06/2023
                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                                                                Imagebase:0xd50000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:moderate

                                                                Target ID:5
                                                                Start time:11:27:15
                                                                Start date:04/06/2023
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff745070000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                Target ID:6
                                                                Start time:11:27:20
                                                                Start date:04/06/2023
                                                                Path:C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\hdoydskbdx\znytpstdcrwsisx.exe"
                                                                Imagebase:0xdf0000
                                                                File size:4967954 bytes
                                                                MD5 hash:A360B0402DD16AE837F59D09E1BF3B3C
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.407208526.000000000175C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.409346361.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.407143398.000000000178F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.407063143.0000000004541000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.405134959.00000000016ED000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.409265675.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.407268539.0000000001729000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.405268351.000000000172A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.405858359.00000000016BA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.405433292.00000000016EC000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.409440308.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.409174074.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.406996996.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.405084980.0000000001457000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.409044743.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000003.405355044.0000000001687000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 81%, ReversingLabs
                                                                Reputation:low

                                                                Target ID:7
                                                                Start time:11:27:22
                                                                Start date:04/06/2023
                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                Imagebase:0xac0000
                                                                File size:69632 bytes
                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.421398026.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.420789152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.421501770.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:moderate

                                                                No disassembly