General

  • Target

    0d86a75c7c632f6c2e315bd31e4afd0c2d06c12aecf3349a7f8b4400875b3826

  • Size

    525KB

  • Sample

    220521-a652tsbdd3

  • MD5

    39120628780e5fe6ddf5820cafbe14b8

  • SHA1

    98a9164fb3c47b4f504d138e307656af68390fa1

  • SHA256

    0d86a75c7c632f6c2e315bd31e4afd0c2d06c12aecf3349a7f8b4400875b3826

  • SHA512

    e8140573905892ebe8e54196c963db15edd6eb2f9b5cc91fa14f676f146cca78ef1b4c02be1c4eae0d0697a146eb64fef9d28099fb12d668bc3fd77fa4513cc7

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

billion1920.duckdns.org:56372

91.192.100.25:56372

Mutex

aa99d9f5-5722-4e07-9fc2-f779c77bfa3a

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    91.192.100.25

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2020-05-08T16:56:13.298869536Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    56372

  • default_group

    7/27 1billion

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    aa99d9f5-5722-4e07-9fc2-f779c77bfa3a

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    billion1920.duckdns.org

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      VIETAZ TRADING CO - ITEMS LIST.exe

    • Size

      778KB

    • MD5

      a296a20f034e1bbb8a7def685cff14ba

    • SHA1

      ea1607d91c15e395b1f815010b91c3e607e55721

    • SHA256

      43978c54ae195f6985cd3170246f6bd6214e36ab14aadb8e753488bee36beef3

    • SHA512

      1c184ae7292c56a6362849780a8454ae159d3255d37ce48091365e0ff1079a44c61dcfe7bb633ddbf17ef2acfd57f03b1fc5925f6aeed05655d9b485b6783902

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks