{"id":2555,"date":"2024-09-25T18:55:10","date_gmt":"2024-09-25T18:55:10","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2555"},"modified":"2025-07-29T03:53:51","modified_gmt":"2025-07-29T03:53:51","slug":"you-get-a-rat-you-get-a-rat-and-you-get-a-rat-nanocore-rat-offered-for-free-on-dark-web","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/you-get-a-rat-you-get-a-rat-and-you-get-a-rat-nanocore-rat-offered-for-free-on-dark-web\/","title":{"rendered":"You get a RAT, you get a RAT, and you get a RAT! NanoCore RAT offered for free on Dark Web"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"480\" height=\"240\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/opra.webp\" alt=\"\" class=\"wp-image-2580\" style=\"width:612px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Despite the creator of NanoCore RAT being sentenced to 33 months jail last year, his creation lives on. LMNTRIX Cyber Defense Centre analysts recently discovered the malware was being offered for free on the Dark Web. The below thread, posted on April 8 this year and written in German, lists a number of RATs available for free download. As well as NanoCore, the author provides links to several other malware variants including Babylon RAT and Echo RAT: &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/r1-1024x1024.webp\" alt=\"\" class=\"wp-image-2581\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/r1-1024x1024.webp 1024w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/r1-300x300.webp 300w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/r1-150x150.webp 150w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/r1-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 1: Deep Web Forum containing download links to RATs<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"457\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R2-1024x457.webp\" alt=\"\" class=\"wp-image-2582\"\/><\/figure>\n\n\n\n<p><em>Figure 2: Downloading Nanocore RAT<\/em><\/p>\n\n\n\n<p>Taylor Huddleston was the first malware author to be prosecuted for their creation \u2013 a creation which has taken on a life of its own, spawning newer variants such as LuminosityLink RAT and Surprise Ransomware. The current version of NanoCore being offered for free online is v1.2.2, it is written in C# dot.net and has the following features:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Remote client shutdown \/ restart<\/li>\n\n\n\n<li>Remote File Browser, Task Manager, Registry Editor, Remote Console<\/li>\n\n\n\n<li>Remote Mouse control<\/li>\n\n\n\n<li>Open webpages<\/li>\n\n\n\n<li>Open CD Tray<\/li>\n\n\n\n<li>Disable Webcam Lights<\/li>\n\n\n\n<li>Remote Execute<\/li>\n\n\n\n<li>Remote Computer Locker with custom encryption (like ransomware)<\/li>\n\n\n\n<li>Remote Reverse Proxy<\/li>\n\n\n\n<li>Remotely recover passwords<\/li>\n\n\n\n<li>Remote Keylogging<\/li>\n\n\n\n<li>Remote Video \/ Audio capture<\/li>\n<\/ol>\n\n\n\n<p>Once downloaded from the Dark Web, the NanoCore RAT is controlled through a user-friendly interface. This lowers the barrier for entry and enables even the most amateur hackers to weaponise emails and kick off their own campaigns:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"786\" height=\"592\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R3.webp\" alt=\"\" class=\"wp-image-2583\"\/><\/figure>\n\n\n\n<p><em>Figure 3: Nanocore RAT loading screen<\/em><br><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"267\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R4.webp\" alt=\"\" class=\"wp-image-2584\"\/><\/figure>\n\n\n\n<p><br><em>Figure 4: Nanocore client connection<\/em><br><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"853\" height=\"581\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R5.webp\" alt=\"\" class=\"wp-image-2585\"\/><\/figure>\n\n\n\n<p><br><em>Figure 5: Nanocore Management<\/em><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"905\" height=\"699\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R6.webp\" alt=\"\" class=\"wp-image-2587\"\/><\/figure>\n\n\n\n<p><br><br><em>Figure 6: Nanocore Remote File Browser<\/em><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"553\" height=\"283\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R7.webp\" alt=\"\" class=\"wp-image-2588\"\/><\/figure>\n\n\n\n<p><br><br><em>Figure 7: Nanocore Management &#8211; Turn off webcam lights<\/em><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R8-1024x578.webp\" alt=\"\" class=\"wp-image-2589\"\/><\/figure>\n\n\n\n<p><br><br><em>Figure 8: Nanocore Management &#8211; Ransomware Module<\/em><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"761\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R9-1024x761.webp\" alt=\"\" class=\"wp-image-2590\"\/><\/figure>\n\n\n\n<p><br><br><em>Figure 9: Nanocore Management &#8211; Keylogging Module<\/em><br><br>Anytime an exploit kit or RAT kit is made available for free, it leads to an explosion of campaigns using the malware \u2013 something we have observed since this Dark Web posting in April.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Current Campaign and TTP<\/h2>\n\n\n\n<p>One of these current campaigns uses a very common TTP as it employs infection via phishing mail and macro-enabled word document. The phishing emails are targeted to the administrative mail address of an organisation and are spoofed to resemble invoices or purchase orders. The attachment names are usually \u201cURGENT.doc\u201d or \u201cPO URGENT.doc\u201d:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"630\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/R10-1024x630.webp\" alt=\"\" class=\"wp-image-2591\"\/><\/figure>\n\n\n\n<p><br><br><em>Figure 10: Malicious Word Attachment<\/em><br><br>The attachment contains a macro code, which is executed automatically when the word document is opened. The following is the behaviour of the macro code.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A javascript file is written in the %APPDATA%\\Local\\Temp folder, &#8220;C:\\Users\\admin\\AppData\\Local\\Temp\\mczekg5e.js&#8221;, which is then executed by \u201cwscript.exe\u201d.<br>\n<ol class=\"wp-block-list\">\n<li>\u201cmczekg5e.js\u201d writes the file &#8220;C:\\Users\\admin\\AppData\\Roaming\\KQWPXSGZoR.js&#8221; and sets a custom AutoRun registry key under current user \u201cHKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\u201d with key name \u201cKQWPXSGZoR\u201d. The value of the key is to execute &#8220;C:\\Users\\admin\\AppData\\Roaming\\KQWPXSGZoR.js&#8221; with \u201cwscript.exe\u201d.<\/li>\n\n\n\n<li>The file &#8220;C:\\Users\\admin\\AppData\\Roaming\\KQWPXSGZoR.js&#8221; is also written to Startup folder path \u201cC:\\Users\\admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KQWPXSGZoR.js\u201d.<\/li>\n\n\n\n<li>Starts cmd.exe in %temp% folder and writes a .vbs file &#8220;C:\\Users\\admin\\AppData\\Local\\Temp\\B3g.vbs&#8221;. Then executes the file with \u201cwscript.exe\u201d. Behaviour of \u201cB3g.vbs\u201d is as follows \u2013<br>\n<ol class=\"wp-block-list\">\n<li>Writes the following files<br>\n<ol class=\"wp-block-list\">\n<li>C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\PN6YT226\\hercilio[1].exe<\/li>\n\n\n\n<li>C:\\Users\\admin\\AppData\\Local\\Temp\\EJV.EXE<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li>Waits for 13 seconds with timeout.exe command.<\/li>\n\n\n\n<li>Executes EJV.EXE, which writes the following files \u2013<br>\n<ol class=\"wp-block-list\">\n<li>C:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\run.dat<\/li>\n\n\n\n<li>C:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\catalog.dat<\/li>\n\n\n\n<li>C:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\storage.dat<\/li>\n\n\n\n<li>C:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\settings.bin<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li>\u201cC:\\Users\\admin\\AppData\\Local\\Temp\\EJV.EXE\u201d copies itself into the path \u201cC:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\DPI Host\\dpihost.exe\u201d<\/li>\n\n\n\n<li>\u201cEJV.EXE\u201d sets an AutoRun registry key under current user \u201cHKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\u201d with key name \u201cDPI Host\u201d. The value of the key is to execute \u201cC:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\DPI Host\\dpihost.exe\u201d.<br><br><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Persistence Techniques<\/h2>\n\n\n\n<p>The macro code drops a Stage One payload, which is a javascript file \u201cC:\\Users\\admin\\AppData\\Roaming\\KQWPXSGZoR.js\u201d. Persistence during this stage is achieved by the following two methods:<br><br>Setting an AutoRun registry key \u201cKQWPXSGZoR\u201d under \u201cHKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\u201d to execute \u201cC:\\Users\\admin\\AppData\\Roaming\\KQWPXSGZoR.js\u201d.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Writing the stage 1 payload into startup folder path \u201cC:\\Users\\admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KQWPXSGZoR.js\u201d.The Stage Two payload is dropped by execution of \u201cB3g.vbs\u201d into \u201cC:\\Users\\admin\\AppData\\Local\\Temp\\EJV.EXE\u201d. It is also observed in the INetCache path \u201cC:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\PN6YT226\\hercilio[1].exe\u201d. This is the NanoCore RAT client. Persistence on Stage 2 is achieved by the following method:<\/li>\n\n\n\n<li>Setting an AutoRun registry key \u201cDPI Host\u201d under \u201cHKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\u201d to execute \u201cC:\\Users\\admin\\AppData\\Roaming\\C5548495-682B-436B-B722-92C4F9C95AE9\\DPI Host\\dpihost.exe\u201d.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Detection<\/h2>\n\n\n\n<p>The attack cycle outlined above can be detected based on the techniques attackers employ. Using MITRE\u2019s ATT&amp;CK Framework, we can break down the attacker techniques as follows.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>T1064 \u2013 Scripting:<\/strong> As scripting is commonly used by system administrators to perform routine tasks, any anomalous execution of legitimate scripting programs, such as PowerShell or Wscript, can signal suspicious behaviour. Checking office files for macro code can also help identify scripting used by attackers. Office processes, such as winword.exe spawning instances of cmd.exe, or script applications like wscript.exe and powershell.exe, may indicate malicious activity.<\/li>\n\n\n\n<li><strong>T1060 &#8211; Registry Run Keys \/ Startup Folder:<\/strong> Monitoring Registry for changes to run keys that do not correlate with known software or patch cycles, and monitoring the start folder for additions or changes, can help detect malware. Suspicious programs executing at start-up may show up as outlier processes that have not been seen before when compared against historical data. Solutions like LMNTRIX Respond, which monitors these important locations and raises alerts for any suspicious change or addition, can help detect these behaviours.<\/li>\n\n\n\n<li><strong>T1193 \u2013 Spearphishing Attachment:<\/strong> Network Intrusion Detection systems, such as LMNTRIX Detect, can be used to detect spearphishing with malicious attachments in transit. In LMNTRIX Detect\u2019s case, in-built detonation chambers can detect malicious attachments based on behaviour, rather than signatures. This is critical as signature-based detection often fails to protect against attackers that frequently change and update their payloads.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Indicator of Compromise<\/h2>\n\n\n\n<p>The table below lists the Indicators of Compromise which can further help security professionals identify NanoCore activity.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th scope=\"col\">INFO<\/th><th scope=\"col\"><strong>VALUE<\/strong><\/th><th scope=\"col\"><strong>TYPE<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Malicious Attachment<\/td><td>P.O. URGENT.doc<\/td><td>Word Document Name<\/td><\/tr><tr><td>Malicious Attachment<\/td><td>70f3125dcf765f405abea4ae1126e98b<\/td><td>MD5<\/td><\/tr><tr><td>Stage 1 payload<\/td><td>f10b1fb2fc5f69ccc148053f930d4c66<\/td><td>MD5<\/td><\/tr><tr><td>Stage 2 payload<\/td><td>e2b951058ababdb4cb738342b67d0c83<\/td><td>MD5<\/td><\/tr><tr><td>Attacker Domain<\/td><td>kcexports.me<\/td><td>Domain<\/td><\/tr><tr><td>RAT Sinkhole<\/td><td>clinton2.duckdns.org<\/td><td>Domain<\/td><\/tr><tr><td>RAT Domain<\/td><td>pluginsrv.duckdns.org<\/td><td>Domain<\/td><\/tr><tr><td>RAT Domain<\/td><td>clintonlog.hopto.org<\/td><td>Domain<\/td><\/tr><tr><td>RAT Domain<\/td><td>prod-tp.sumo.mozit.cloud<\/td><td>Domain<\/td><\/tr><tr><td>RAT IP<\/td><td>67.207.93.17<\/td><td>IP Address<\/td><\/tr><tr><td>RAT IP<\/td><td>192.169.69.25<\/td><td>IP Address<\/td><\/tr><tr><td>RAT IP<\/td><td>185.244.31.111<\/td><td>IP Address<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Recommendations<\/h2>\n\n\n\n<p>The strategies outlined in the \u2018Detection\u2019 section above, coupled with the list of IoCs, can help security personnel identify the presence of NanoCore RAT in their networks.<\/p>\n\n\n\n<p>LMNTRIX\u2019s Adaptative Threat Response solution also provides complete endpoint security with detection techniques mapped to the \u201cMITRE ATT&amp;CK\u201d framework. With advanced analytics, LMNTRIX XDR brings light to threats that otherwise go undetected, along with detailed analysis to provide attack attribution and mitigation. The LMNTRIX solution includes an inbuilt offline capability which uses machine learning models to classify malicious files and quickly isolates the location and determines the extent of the executable.<\/p>\n\n\n\n<p>LMNTRIX Detect is a part of the Active Defense solution and focuses on Network Intrusion Detection. It receives numerous proprietary and open source feeds for classification of IP and domain names, and contains a detonation chamber\/sandbox environment that allows for quick assessment of suspicious files entering the perimeter via network.<\/p>\n\n\n\n<p>On 2019-08-22<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite the creator of NanoCore RAT being sentenced to 33 months jail last year, his creation lives on. LMNTRIX Cyber Defense Centre analysts recently discovered the malware was being offered for free on the Dark Web. The below thread, posted on April 8 this year and written in German, lists a number of RATs available [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2580,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2555"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2555\/revisions"}],"predecessor-version":[{"id":4266,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2555\/revisions\/4266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2580"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}