General
-
Target
9c235312c8d1361e89a1536b9f3b61379303b38c0314dfd545ac4691d8bceb2d
-
Size
371KB
-
Sample
221126-hwnc2aba22
-
MD5
1b40799686c824c63bee08e4a12a2643
-
SHA1
f3b349f883b64393f67405ba12abd5a413846142
-
SHA256
9c235312c8d1361e89a1536b9f3b61379303b38c0314dfd545ac4691d8bceb2d
-
SHA512
109c0e230150ab7d1fe00904cac937accce2a4d7769673338cc0f5c771adca673df031aeee397d86117d018c50d907cf1ea6b905c45df5c2cd28f95f946d845d
-
SSDEEP
6144:V1jeD5KSYmb9JXMGEg+LnSSqtq5WJdv6l9z4cSoQQHa+LvYTzPE7Xz3FQ:rjeMSPD7+LnSSqoVl9zioQQPYT2Xz1
Static task
static1
Behavioral task
behavioral1
Sample
9c235312c8d1361e89a1536b9f3b61379303b38c0314dfd545ac4691d8bceb2d.exe
Resource
win7-20220901-en
Malware Config
Extracted
nanocore
-
activate_away_mode
false
- backup_connection_host
- backup_dns_server
-
buffer_size
0
-
build_time
0001-01-01T00:00:00Z
-
bypass_user_account_control
false
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
0
-
connection_port
0
- default_group
-
enable_debug_mode
false
-
gc_threshold
0
-
keep_alive_timeout
0
-
keyboard_logging
false
-
lan_timeout
0
-
max_packet_size
0
- mutex
-
mutex_timeout
0
-
prevent_system_sleep
false
- primary_connection_host
- primary_dns_server
-
request_elevation
false
-
restart_delay
0
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
0
-
use_custom_dns_server
false
- version
-
wan_timeout
0
Targets
-
-
Target
9c235312c8d1361e89a1536b9f3b61379303b38c0314dfd545ac4691d8bceb2d
-
Size
371KB
-
MD5
1b40799686c824c63bee08e4a12a2643
-
SHA1
f3b349f883b64393f67405ba12abd5a413846142
-
SHA256
9c235312c8d1361e89a1536b9f3b61379303b38c0314dfd545ac4691d8bceb2d
-
SHA512
109c0e230150ab7d1fe00904cac937accce2a4d7769673338cc0f5c771adca673df031aeee397d86117d018c50d907cf1ea6b905c45df5c2cd28f95f946d845d
-
SSDEEP
6144:V1jeD5KSYmb9JXMGEg+LnSSqtq5WJdv6l9z4cSoQQHa+LvYTzPE7Xz3FQ:rjeMSPD7+LnSSqoVl9zioQQPYT2Xz1
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-