← Back to SOC feed Coverage →

ThreatFox: nccTrojan IOCs

ioc-hunt HIGH ThreatFox
DeviceFileEvents
backdooriocthreatfoxwin-ncctrojan
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-20T11:00:00Z · Confidence: high

Hunt Hypothesis

The ThreatFox: nccTrojan IOCs rule detects potential indicators of compromise associated with the nccTrojan malware, which is used for persistent remote access and data exfiltration. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate stealthy backdoor activity that could lead to long-term system compromise.

IOC Summary

Malware Family: nccTrojan Total IOCs: 2 IOC Types: sha256_hash, sha1_hash

TypeValueThreat TypeFirst SeenConfidence
sha256_hash9fd30bda0edf3b10b326703303fa15995a688d200582822ef49422ebac87b7f7payload2026-05-2075%
sha1_hashc8ac1b977d771c89ed7152f0daedb6a3e8b69b24payload2026-05-2075%

KQL: Hash Hunt

// Hunt for files matching known malicious hashes
// Source: ThreatFox - nccTrojan
let malicious_hashes = dynamic(["9fd30bda0edf3b10b326703303fa15995a688d200582822ef49422ebac87b7f7", "c8ac1b977d771c89ed7152f0daedb6a3e8b69b24"]);
DeviceFileEvents
| where SHA256 in (malicious_hashes) or SHA1 in (malicious_hashes) or MD5 in (malicious_hashes)
| project Timestamp, DeviceName, FileName, FolderPath, SHA256, InitiatingProcessFileName
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.ncctrojan/