General

  • Target

    b2c0d0fb732a1676418336585176bb1e8e0f1db914b5419f398a172756f88be1

  • Size

    605KB

  • Sample

    220521-cq8h5aeda7

  • MD5

    256b218fc7ff80bfaa55083504b525f3

  • SHA1

    d595eaa510ec0a60b6ed1d860e335ea5c2183c69

  • SHA256

    b2c0d0fb732a1676418336585176bb1e8e0f1db914b5419f398a172756f88be1

  • SHA512

    f5a00d91cca93a80d8de22cce87cd544448ed4137abfe79a48297afbe350c30a159c1aaffe8c8cbdabcdc5989b53cc9da43f97cf3192476550af6a2f527b43da

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

harolds.ooguy.com:6051

harold.2waky.com:6051

Mutex

79556390-7150-4551-9067-10cd33e6482e

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    harold.2waky.com

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2020-04-28T08:36:06.976087436Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    6051

  • default_group

    Acandy

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    79556390-7150-4551-9067-10cd33e6482e

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    harolds.ooguy.com

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      Proof Of Payment.scr

    • Size

      831KB

    • MD5

      22178eb7c68a50049e957fcf78b6515e

    • SHA1

      4e7788b3983bac98179aa70aaeb8f4e088191b90

    • SHA256

      d0b5b67a47d70659712ff004c3d7e91b5027100bbd84db3407e9668ed6a408f1

    • SHA512

      a6816c5e58519eff11beb22ba87023bbd1b9844fae6b7d23e41a23ce850c77c9643e688fe4a1cf7c509376ff873db6892892ef86ed74cfbeabd86f85edace623

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks