General
-
Target
f2cfd6e893c39081ea492637867f51b366fc71906a7d37e84d1714fa5e588acf
-
Size
357KB
-
Sample
220521-cafs6sgegn
-
MD5
911fe25d41db0a9dc4ceace97f49bdf0
-
SHA1
6ec8d84bcf7b25efbf3cc40f9bfd7eafdb9c6de5
-
SHA256
f2cfd6e893c39081ea492637867f51b366fc71906a7d37e84d1714fa5e588acf
-
SHA512
a7aa1ca4c6f3687541393656c81ded6b79d0836d443ebb640d59df7bbd2e770e302b068c0009dd265b8bea3363314798a257ec74fedc9c93c300163202b684e1
Static task
static1
Behavioral task
behavioral1
Sample
READSUN OPTICAL LTD ORDER_xls.exe
Resource
win7-20220414-en
Malware Config
Extracted
nanocore
1.2.2.0
194.5.98.8:4573
127.0.0.1:4573
b53fb692-ee4a-4d43-afbf-f4b9bb6fef38
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-02-08T12:56:34.023183336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4573
-
default_group
JOE
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b53fb692-ee4a-4d43-afbf-f4b9bb6fef38
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
194.5.98.8
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
READSUN OPTICAL LTD ORDER_xls.exe
-
Size
466KB
-
MD5
077d9c1b49762fd62b8fccf6e5c76b01
-
SHA1
5f9170601fad6ff3454f098fdd16222d36796981
-
SHA256
bf0ad956a210613614b06919c4663576b23ed1c415ddd5051ff858c84a1554e4
-
SHA512
a3a7a5cf38d535f631148e021d3cafe63958d2186e190786a00df1c9e2547aaf41770ddb927390a9fa8027245816fe08c9d4f2c9f9598e87f9c9e469b63ca3f4
-
Suspicious use of SetThreadContext
-