BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
6
Global rank
28 infographic chevron month
Month rank
28 infographic chevron week
Week rank
541
IOCs

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Trojan
Type
USA
Origin
1 January, 2013
First seen
25 April, 2024
Last seen

How to analyze Nanocore with ANY.RUN

Type
USA
Origin
1 January, 2013
First seen
25 April, 2024
Last seen

IOCs

Hashes
5b01af2166405a5d916dc334e879c1adbeee467873d8fe27c0cb417d2d446abd
1f0371693e4899f664b1dd6ce476504fdb731edbe8a6e4ee6cabd9a230646b48
2d6c123c300664c82ee8b1dcee5ac7d514808fc156397fb1fded29dbc9b8e939
7740aa30f60314a4535de30e79f75701f66de770e0b32c3c319a109641dbcc7f
1071b0ec6f5efe3a1cbf998f27a8109acbddaf4318881e5968cd41257b3db6f7
e9bf1c9de5bc08eb5d539326f1de8fcbdd63ac6294d2a02d62ced4d942815cf2
ee5170a83c7a05c6f84c3cfb9e666838115922942fe2110f13f6c2bd2d9e80a2
72b951386354b88643384922d28d653f8a1b6c43e5bd9211316c94dcae9b87e1
1e7b932dbbcf5909b65cda2735c443b2ef60d7c8a68f62c3a70a458d11ddfd7d
c5816cf1dd39f66d67d6083147c8b2e10683a2f5892acad56aafa3c539d1fd31
76911e0f1147fe0341bd7a591f749371ae37bc185e2e7fb3332da22c67d10fb3
3d6a42bd21894d052834a6e3138ea45a926af1abddffc64b51fe3a6fb284d16f
eacbb3f4ee2fe2eccacc2ce30c2dbe98a8fa1714ce7e055b302e15ac1fd0b55b
531f71d9031613a45d12fd4fe4f885e860a515f8f0c437b236602e6cba37e2f6
8d978bfba2436ba7ee3393e84322da7fa62626d6de95e4ae4a36e85200814b04
77dd08fac6833c6ef555e84c2ef5599ed10b7e6dad2da324e4ad643e843709d0
cfee0fb48134e7fecf10d360e537299729b365a47e813c89aebbd167467cd35b
58baa4293f2d7c819ba619c08d1e4ce26e859a9efb05cd1289bd09c4880985f6
b28e81db9fc3807c0660fd2cdb29545fd39749f7f21768832dd47b52ccf04812
f574596f8278089c2ee1d169f69b403ad45c20d3346613ffe0ccd993f95dcb29
Domains
myhop.hopto.org
whois.dzbc.org
URLs
http://lazyshare.net/PluginStats/Functions/newLog.php
http://lazyshare.net/PluginStats/Functions/checkInstall.php
http://lazyshare.net/PluginStats/Functions/getPluginName.php
Last Seen at

Recent blog posts

post image
Find Malware by File Contents with YARA Searc...
watchers 45
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 317
comments 0
post image
New PowerShell Script Tracer: Analyze PowerSh...
watchers 614
comments 0

What is NanoCore malware?

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins that allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

This malware was recorded in the wild for the first time in 2013. Since then it has become extremely popular. It is now used in attacks all around the world. As a modular malware, the functionality of the NanoCore backdoor can be greatly expanded with plugins. This makes an already dangerous RAT potentially even more destructive for the company's cybersecurity.

Distributed on its own website with 24/7 technical support for just $25 with all official plugins included, the malware can also be downloaded from hacking forums where its "cracked" version has been leaked multiple times, making it an extremely accessible trojan to set up and use. Unfortunately, the accessibility, ease of use, and a bunch of information on NanoCore are still contributing to its growing popularity. It’s not completely certain whether the malware was being developed as a commercial program for institutions, or the creator had a goal to create malicious software from the beginning, Regardless, NanoCore author, Taylor Huddleston was tracked down and arrested by the FBI.

General Information about NanoCore RAT

According to the analysis, NanoCore’s first beta appeared in 2013. The latest version of the malware is being openly sold on its own website NANOCORE_dot_io. Unfortunately, this helped ensure the high popularity of the malware. Today NanoCore RAT targets victims worldwide. However, the majority of attacks are taking place in the US.

One of the key characteristics of this RAT is that technically savvy attackers are able to greatly expand the functionality of the malware, fine-tuning it to suit their needs, for instance, by adding screen locker functionality to the virus. Some essential plugins are already provided with the purchase bundle on the “official” website. Other even more sophisticated ones are being developed by the community of cybercriminals, that has formed around NanoCore.

For crooks that don’t want to engage in fiddling with plugins, NanoCore provides a straightforward user interface It allows even novice criminals to launch potentially destructive malicious campaigns. Thus further contributing to the popularity of the malware.

Interactive analysis of NanoCore

A video of the execution process provided by ANY.RUN malware hunting service allows us to perform the analysis of the lifecycle of the trojan or other malware such as WSHRAT or Vidar. We can watch NanoCore behavior as well as all processes as they unfold in a secure online environment.

nanocore execution process graph

Figure 1: A visual graph of NanoCore execution processes generated by ANY.RUN

How does NanoCore spread?

NanoCore RAT is distributed using multiple methods. However, the most commonly used is spam email campaigns. They trick users into downloading malicious documents, often presented as price lists or purchase orders.

The emails sometimes contain malicious attachments with .img or .iso extension. The large size of these files makes it difficult to scan them. Some versions of malware are also spread by a ZIP file which evades secure email gateways. Several file structure works here: one file script will download the payload while the rest are decoys that ensure the malicious content goes unnoticed by the system's security.

PowerPoint files acquire the same scenario as the infection chain takes place over multiple stages before the final payload is executed.

NanoCore RAT execution process

NanoCore is delivered to the victim’s PC using the AutoIt program. Not unlike Agent Tesla malware, which is somewhat typical for this type of RATs. Typically, NanoCore is spread using Microsoft Word documents. Infected files contain an embedded executable file or an exploit.

According to the RAT analysis, once the script file is opened an embedded macros download an executable script file and rename it. The downloaded executable file runs itself and creates a child process. The malware is able to use Regsvcs and Regasm to proxy the code execution through a trusted Windows utility.

nanocore execution process tree

Figure 2: A process tree of NanoCore execution processes generated by ANY.RUN

How to detect NanoCore malware using ANY.RUN?

You can identify whether you are dealing with a sample of NanoCore RAT or not by a quick analysis of the files and scripts created by the malware. Most often NanoCore injects into three processes RegSvcs.exe, RegAsm.exe, and MSBuild.exe.

Open "Advanced details of process" for these processes and look at the "Modified files" tab in the "Events" section. If a file named "run.dat" was created by one of these processes and placed in the %Root%:\Users\username\AppData\Roaming[GUID] folder, you can be sure that the malware you are observing is, in fact, NanoCore trojan.

file created by nanocore Figure 3: File created by Nanocore

Conclusion

Thanks to accessibility, ease of use, customization, and plenty of information, the popularity of NanoCore escalated making it one of the most widespread RATs in the world. Even though NanoCores’ creator has been arrested by officials, due to the appearance of several cracked versions, NanoCore is still openly available on hacker forums.

Often, it can be acquired for free, allowing anybody to set up attacks. The popularity of the malware is further aided by the fact that one does not need much programming knowledge to use this Trojan, as it comes equipped with a user-friendly interface. At the same time, very sophisticated and destructive attacks can be carried out with NanoCore RAT by skillful hackers, since its malicious capabilities can be extended with custom plugins. Thankfully, modern analysis tools such as ANY.RUN allow researchers to examine malware in detail, learn about its behavior patterns and set up an appropriate cybersecurity response.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy