General
-
Target
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48
-
Size
939KB
-
Sample
221119-kmx7zsce86
-
MD5
4325caea282be99b605e26754c406830
-
SHA1
a0c95de32751cd5a4defb993a5f556f3544cb7e4
-
SHA256
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48
-
SHA512
19ab4631739af22256f00d3320dac7d864c68070c695788aeb419952c16af6a25daf40eaa060f1d0dee7df4f00e16a82e3b372e6adeaed98800b8ec50517a17b
-
SSDEEP
12288:NjYlUdVCU5S41Yd2Z+pW/qF9vUi/zr4e56K0AbDcZ2yGTNGNPG8OcXDyHVZgPKpv:jVG46PFFNnH4NPucYNaPVWVZXp/
Static task
static1
Behavioral task
behavioral1
Sample
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
nanocore
1.2.2.0
aje.ddns.net:9991
d86cd23e-85c5-4bd1-aecb-b7be43080c66
-
activate_away_mode
true
-
backup_connection_host
aje.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2015-03-10T13:36:53.354214636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
9991
-
default_group
MILLI
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
d86cd23e-85c5-4bd1-aecb-b7be43080c66
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
aje.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48
-
Size
939KB
-
MD5
4325caea282be99b605e26754c406830
-
SHA1
a0c95de32751cd5a4defb993a5f556f3544cb7e4
-
SHA256
61eea36a4fe7a62d5e6c371d13c835f00ed1f96b9237b52f39be66707b558b48
-
SHA512
19ab4631739af22256f00d3320dac7d864c68070c695788aeb419952c16af6a25daf40eaa060f1d0dee7df4f00e16a82e3b372e6adeaed98800b8ec50517a17b
-
SSDEEP
12288:NjYlUdVCU5S41Yd2Z+pW/qF9vUi/zr4e56K0AbDcZ2yGTNGNPG8OcXDyHVZgPKpv:jVG46PFFNnH4NPucYNaPVWVZXp/
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-