ThreatFox IOC Database

You are viewing the ThreatFox database entry for ip:port 103.133.111.25:1007.

Database Entry


IOC ID:395734
IOC: 103.133.111.25:1007
IOC Type :ip:port
Threat Type :botnet_cc
Malware: Nanocore RAT
Malware alias:Nancrat, NanoCore
Confidence Level : Confidence level is high (100%)
Is compromised? : False
ASN:AS135905 VNPT-AS-VN
Country:- VN
First seen:2022-03-16 16:15:27 UTC
Last seen:never
UUID:4ad324ac-a544-11ec-a022-42010aa4000a
Reporter AndreGironda
Reward 5 credits from ThreatFox
Tags:NanoCore

Avatar
AndreGironda
MITRE T1566.001
Date: Wed, 16 Mar 2022 01:30-02:00 +0100
Received: from ecommercen5.advisable.gr (159.69.5.199)
Received-SPF: pass (ecommercen5.advisable.gr: connection is authenticated)
MIME-Version: 1.0
From: Hong Tonmng Industrial <satte.india@exhi.informamarketsindia.com>
To: undisclosed-recipients:;
Subject: RE: PURCHASE ORDER 10042022
User-Agent: Roundcube Webmail/1.4.13
Message-ID: <e0a4d6694259c75d59b37bfa6cdf6d09@exhi.informamarketsindia.com>
X-Sender: satte.india@exhi.informamarketsindia.com
Content-Type: multipart/mixed; boundary="=_07e5a84a8a24df511b90f4c2a1ac1529"
Return-Path: satte.india@exhi.informamarketsindia.com
Attachment Name: New Order Listed.doc
RTF SHA256: fee7d19efec68746396c625d07f72d9ede3181d39f41d3e20be364d337950249
Maldoc Exploit Kit: CVE-2017-11882
Stage URL: hXXp://2[.]58.149.41/nzezx[.]exe
Stage Executable SHA256: 62cb486b54247e61986157ccd85361327b06ed60fe384afc9c8738fee1588c8f
Nanocore Unpacked Executable SHA256: 7780fa8c526520e263f86baf9dc3d9294855db4ed97c62e9ede4fdd7bd9bcc44
SurveillanceExClientPlugin.dll DLL SHA256: ce5c91c3174bbe9c88d5b7100ab3202aca83b0c6bdeb84c454391b751697e849

Malware Samples


The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).

Time stamp (UTC)SHA256 hashBazaar
2022-03-21 10:47:22 001db04adeb3b46806179452b694c543b01b00f2b16996bb7b44b38c9c89307b