General
-
Target
DHL_10177_R29_DOCUMENT.exe
-
Size
845KB
-
Sample
210114-cezanpw432
-
MD5
3bdd0493e354e506bd6cbd81ec14ea48
-
SHA1
a97dd1b3e1f55a852f3af6b082b1ad7304735525
-
SHA256
9da23f9a781b72621d3e787154ff0fc50c89cb33070467c7fd0fa0b24f07108c
-
SHA512
21ec58168f8b0043a3c2df245d8251d67c3bff7432007aff7459740d3c63ef00d9ecd3317994ba9c9e4ff33241b534d34ede72cb5db7cdc90fd03411d33eed20
Static task
static1
Behavioral task
behavioral1
Sample
DHL_10177_R29_DOCUMENT.exe
Resource
win7v20201028
Malware Config
Extracted
nanocore
1.2.2.0
185.157.160.233:2212
annapro.linkpc.net:2212
5c958888-f81c-42a4-939d-31983a2cd9ba
-
activate_away_mode
true
-
backup_connection_host
annapro.linkpc.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-10-24T06:39:59.095270636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
2212
-
default_group
wuzzy122
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5c958888-f81c-42a4-939d-31983a2cd9ba
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
185.157.160.233
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
DHL_10177_R29_DOCUMENT.exe
-
Size
845KB
-
MD5
3bdd0493e354e506bd6cbd81ec14ea48
-
SHA1
a97dd1b3e1f55a852f3af6b082b1ad7304735525
-
SHA256
9da23f9a781b72621d3e787154ff0fc50c89cb33070467c7fd0fa0b24f07108c
-
SHA512
21ec58168f8b0043a3c2df245d8251d67c3bff7432007aff7459740d3c63ef00d9ecd3317994ba9c9e4ff33241b534d34ede72cb5db7cdc90fd03411d33eed20
-
Suspicious use of SetThreadContext
-