{"id":2738,"date":"2024-09-25T19:40:57","date_gmt":"2024-09-25T19:40:57","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2738"},"modified":"2025-07-29T06:36:27","modified_gmt":"2025-07-29T06:36:27","slug":"as-nanocores-creator-awaits-sentencing-lets-unpack-his-handiwork","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/as-nanocores-creator-awaits-sentencing-lets-unpack-his-handiwork\/","title":{"rendered":"As Nanocore\u2019s creator awaits sentencing, lets unpack his handiwork"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"403\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/defense-attorney-840062_960_720.webp\" alt=\"Prisoner\" class=\"wp-image-2745\" style=\"width:809px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Earlier this year, the creator of the Nanocore Remote Access Trojan (RAT), Taylor Huddleston, <a href=\"https:\/\/thehackernews.com\/2017\/07\/nanocore-rat-pleads-guilty.html\" target=\"_blank\" rel=\"noopener\">pled guilty<\/a> to aiding and abetting computer intrusions by selling his creation online for as little as $25. He\u2019s due for sentencing later this week and faces up 10 years in prison.&nbsp;<br><br>As an interesting side note, before pleading guilty <a href=\"https:\/\/krebsonsecurity.com\/tag\/taylor-huddleston\/\" target=\"_blank\" rel=\"noopener\">Huddleston\u2019s defence<\/a> argued that Nanocore was created as a legitimate program, designed to give users a simple way to control their computers remotely.<br><br>Despite being collared by authorities, his legacy lives on. Nanocore is still one of the most popular RATs, and is being used by hackers around the globe.&nbsp;<br><br>Developed in dot NET, it is one of the most sophisticated RATs we\u2019ve seen. On top of the standard functionality you\u2019d expect to see (key-logging, and mic and webcam access), it also includes an external Distributed Denial of Service (DDoS) plugin which enables hackers to use victim machines as a proxy to bring down a third-party server, as well as a ransomware-like feature to lock people out of their PCs.<br><br><strong>Overview&nbsp;<\/strong><br><br>Once Nanocore compromises a system, it gives attackers almost complete control over the infected machine. In addition to the features mentioned above, it opens a back door on the computer, enabling an attacker to perform the following actions:&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;Transfer and execute files<br><br>\u2022&nbsp;&nbsp; &nbsp;Enter and execute commands<br><br>\u2022&nbsp;&nbsp; &nbsp;Edit the registry<br><br>\u2022&nbsp;&nbsp; &nbsp;View the desktop<br><br>\u2022&nbsp;&nbsp; &nbsp;Create instant message windows<br><br>\u2022&nbsp;&nbsp; &nbsp;Update the Trojan<br><br>\u2022&nbsp;&nbsp; &nbsp;Manage running processes<br><br>\u2022&nbsp;&nbsp; &nbsp;Steal passwords stored in web browsers and email clients<br><br><strong>Distribution&nbsp;<\/strong><br><br>Nanocore is usually spread via spam emails with malicious attachments or an embedded JavaScript file (.js).&nbsp;<br><br>In a campaign discovered by LMNTRIX researchers late last month, French users were targeted with a PDF file with embedded JavaScript. Once opened, a HTA (HTML Application) file payload was downloaded from Google Drive. This method &nbsp;bypassed Adobe security warnings by taking advantage of Google\u2019s reputation.<br><br>The PDF displayed a fake notification stating the user\u2019s Flash Player was outdated, prompting the installation of an updated version.<br><br>The downloaded .HTA file contained VBScript which decoded the embedded binary payload, and downloaded it into the %TEMP% directory of the target machine before execution.<br><br><strong>Persistence<\/strong><br><br>Upon infection, the malware drops winlogon.exe in the Startup Folder so it executes on every reboot:<br><br>C:\\Users\\&lt;user-name&gt;\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\winlogon.exe.lnk<br><br><strong>File Details<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Type&nbsp;<\/td><td>Portable Executable (PE) file<\/td><\/tr><tr><td>Md5 hash<\/td><td>25640ca48d3fbfd7e070b7685c053b51<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><br><br>The screenshot below shows the recent Nanocore sample is written in dot NET:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-5-1.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>Static analysis immediately uncovered some suspicious strings which gave away the file\u2019s malicious nature:<br><br>\u2022&nbsp;&nbsp; &nbsp;GetProcAddress (gets current process address)<br><br>\u2022&nbsp;&nbsp; &nbsp;KillOnExit (checks for some parameters, exits all processes if parameters are true)<br><br>\u2022&nbsp;&nbsp; &nbsp;HttpWebClientProtocol<br><br>\u2022&nbsp;&nbsp; &nbsp;set_Proxy (to use victim&#8217;s machine as proxy)<br><br>\u2022&nbsp;&nbsp; &nbsp;CreateDecryptor<br><br>\u2022&nbsp;&nbsp; &nbsp;CreateEncryptor (to encrypt files)<br><br>\u2022&nbsp;&nbsp; &nbsp;GetCurrentProcess (checks current process)<br><br>\u2022&nbsp;&nbsp; &nbsp;GetProcessesByName (checks process name)<br><br><strong>Dynamic Analysis<\/strong><br><br>The following diagram represents the chain of activities which occurred during infection:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-3-2.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><br><br>Once executed, the malware\u2019s behavior can be seen in the below screenshot:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-4-2.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>We witnessed the sample drop and execute &#8220;tmp.exe&#8221; and &#8220;svchost.exe&#8221;, and connect to the IP address &#8220;185.82.216.57&#8221; via port \u201c5254\u201d:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-4-2.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>This IP was contacted in regular intervals:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-4-2.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>Once these steps were completed, \u201csvchost.exe\u201d started running as a background process:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-4-2.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>During the infection, the following files were dropped\u2026<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Roaming\\tmp.exe md5: df145cc72ceb0db5881ed33961e678b9<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Roaming\\winlogon\\winlogon.exe md5: 25640ca48d3fbfd7e070b7685c053b51<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\test\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\winlogon.exe.lnk (to maintain persistence)<br><br>\u2026 and the following registry value was created:<br><br>HKU\\S-1-5-21-132656071-2218712632-614148903-1000\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Load: &#8220;C:\\Users\\&lt;username&gt;\\AppData\\Roaming\\winlogon\\winlogon.exe.lnk&#8221;<br><br><strong>Indicators of compromise<\/strong><br><br><strong>All files<\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;25640ca48d3fbfd7e070b7685c053b51<br><br>\u2022&nbsp;&nbsp; &nbsp;df145cc72ceb0db5881ed33961e678b9<br><br>\u2022&nbsp;&nbsp; &nbsp;9d9d45a925cec55f0b7456cf82c30f08<br><br>\u2022&nbsp;&nbsp; &nbsp;74e3f9da2862e544a1561af43a99da77<br><br>\u2022&nbsp;&nbsp; &nbsp;47d469fdff50ba8df9d474343896d27c<br><br><strong>Command and Control<\/strong><br><br>The below IP addresses and URL were contacted, indicating the malware\u2019s C&amp;C servers:<br><br>\u2022&nbsp;&nbsp; &nbsp;42.202.71.145<br><br>\u2022&nbsp;&nbsp; &nbsp;41.207.196.84<br><br>\u2022&nbsp;&nbsp; &nbsp;185.82.216.57:5254<br><br>ajam62[.]hopto[.]org<br><br><strong>Registries added<\/strong><br><br>HKU\\S-1-5-21-132656071-2218712632-614148903-1000\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Load: &#8220;C:\\Users\\&lt;username&gt;\\AppData\\Roaming\\winlogon\\winlogon.exe.lnk&#8221;<br><br><strong>Prevention&nbsp;<\/strong><br><br>In addition to the fundamental basics (keep operating systems patched, security licenses updated and don\u2019t open suspicious email attachments), users should disable Autorun to prevent any external devices from automatically executing and enforce file sharing protection policies.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this year, the creator of the Nanocore Remote Access Trojan (RAT), Taylor Huddleston, pled guilty to aiding and abetting computer intrusions by selling his creation online for as little as $25. He&rsquo;s due for sentencing later this week and faces up 10 years in prison.&nbsp; As an interesting side note, before pleading guilty Huddleston&rsquo;s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2745,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2738"}],"version-history":[{"count":6,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2738\/revisions"}],"predecessor-version":[{"id":4308,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2738\/revisions\/4308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2745"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}