General

  • Target

    fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802

  • Size

    1.3MB

  • Sample

    220725-fkrj7sffgp

  • MD5

    f41ac3c9d7cac6153c6687fe0b160dc9

  • SHA1

    c7368bb2435f0dca25a39fe11ca1df1be9dbef6c

  • SHA256

    fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802

  • SHA512

    40d7605ec4244a702893ed926b5e4eeef41052fa06ffd5c753bf06b03c171dcd6929a58d2336f47ac4b5def49221c811748f8b9962896ed900141ddda595bc8d

Malware Config

Targets

    • Target

      fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802

    • Size

      1.3MB

    • MD5

      f41ac3c9d7cac6153c6687fe0b160dc9

    • SHA1

      c7368bb2435f0dca25a39fe11ca1df1be9dbef6c

    • SHA256

      fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802

    • SHA512

      40d7605ec4244a702893ed926b5e4eeef41052fa06ffd5c753bf06b03c171dcd6929a58d2336f47ac4b5def49221c811748f8b9962896ed900141ddda595bc8d

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • suricata: ET MALWARE Possible NanoCore C2 60B

      suricata: ET MALWARE Possible NanoCore C2 60B

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks