General

  • Target

    a492aca34517c2f768b8b307888c58b86ea6fa68007090a2db39e879c6a53079

  • Size

    652KB

  • Sample

    220701-hqw3zsaea4

  • MD5

    efc107a3d9843e68793b3ce93852b688

  • SHA1

    35d4e7e0c5f5f024da963099a464b1106fca8fe4

  • SHA256

    a492aca34517c2f768b8b307888c58b86ea6fa68007090a2db39e879c6a53079

  • SHA512

    70b3b0cd5daa5bb4f862c0bcb97f266cedd73a71ce2c812b3901389bb917f7fd8a8665fe754a233bfcfd4b6618884ce62736fb01e6b01916ef6f674869458955

Malware Config

Targets

    • Target

      a492aca34517c2f768b8b307888c58b86ea6fa68007090a2db39e879c6a53079

    • Size

      652KB

    • MD5

      efc107a3d9843e68793b3ce93852b688

    • SHA1

      35d4e7e0c5f5f024da963099a464b1106fca8fe4

    • SHA256

      a492aca34517c2f768b8b307888c58b86ea6fa68007090a2db39e879c6a53079

    • SHA512

      70b3b0cd5daa5bb4f862c0bcb97f266cedd73a71ce2c812b3901389bb917f7fd8a8665fe754a233bfcfd4b6618884ce62736fb01e6b01916ef6f674869458955

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • suricata: ET MALWARE Possible NanoCore C2 60B

      suricata: ET MALWARE Possible NanoCore C2 60B

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks