Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0336

NanoCore

Type

Remote Access Trojan (RAT)

Associated threat actors

Various

Key Capabilities

Provides unauthorized access and full control over infected systems using a modular design.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is NanoCore?

NanoCore (S0336) is a versatile Remote Access Trojan (RAT) used for data theft. A key feature of NanoCore is that it is a modular malware, meaning it can use plugins to customize its functions. For example, it can ‘add on’ command execution, keylogging, or screen capture. NanoCore operates stealthily to give attackers full control over an infected computer.

Its capabilities include key logging for stealing credentials, screen capture for surveillance, and the ability to deploy other malware.

How to Defend Against NanoCore?

Defending against NanoCore requires preventing its initial infection and detecting its command-and-control (C2) activity.

  • Be cautious with email attachments and downloads, which are the primary delivery vectors for this RAT.
  • Keep all operating systems and applications patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus to identify and block the execution of known RATs and their malicious plugins.
  • Use network detection (NDR) with integrated threat intelligence to spot and block NanoCore’s C2 communications.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.