General
-
Target
PO-13916654658867654342002.z
-
Size
298KB
-
Sample
211019-r8pw3aghfq
-
MD5
da4b898c6785af14399108f833232619
-
SHA1
3508a03bb0c705661d88d8bf4781837b0b5ddc18
-
SHA256
e5e35c2cfe25d9cb5f048b3dcb989b12886db08356b8a1a5241dfae96704e1c9
-
SHA512
4f5024d8ca9ae24db9c5ed051c3595c06930c58c8a192e9cb6737e68af7ca03a72bcd1cdb167d329857f6433aad36ba433b65de287e18862117f61d1c1390343
Static task
static1
Behavioral task
behavioral1
Sample
PO-13916654658867654342002.exe
Resource
win7-en-20210920
Malware Config
Extracted
nanocore
1.2.2.0
185.157.160.229:60006
neoncorex.duckdns.org:60006
1d5c6a3e-60c1-4684-aee7-fbdc0338bfa0
-
activate_away_mode
true
-
backup_connection_host
neoncorex.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-07-29T18:43:26.772131836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
60006
-
default_group
NANOSHIELD
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1d5c6a3e-60c1-4684-aee7-fbdc0338bfa0
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
185.157.160.229
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
PO-13916654658867654342002.exe
-
Size
479KB
-
MD5
6102daa4935e016dea8dc3eec27d2ac1
-
SHA1
c5320bd4d54b856aa90bc7a92ca9ce5dc22e70ca
-
SHA256
5d192cc1e5d9569479192b9ca7147953428158484ab4f5c0480ad220688fbfce
-
SHA512
92d0683cc73ea1479426a5869cc66be21b28482069af8c8fceb69ea183d978d5f600323011c7944a1b618b11e3a56d4371aaf8dcc3238098c4388eccd5115b51
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-