General
-
Target
3e1f3e1ef5336c11574f5903b0045ce9ac60bb783dba02018e2da62b7aa24858
-
Size
737KB
-
Sample
221127-g8hsmsaf6x
-
MD5
1eb49342e98b994878513eafb305d19d
-
SHA1
b0f3cf44288f9eecb1ff45183e168276cb289f50
-
SHA256
3e1f3e1ef5336c11574f5903b0045ce9ac60bb783dba02018e2da62b7aa24858
-
SHA512
182dd6b93fda682c0a4ea5070a4a296cb52763808065ea9b32760a00cd043ebca6040197ddc1e9a29cbbf72ee6a822c58220ef31ce831269bfa64a1447cfeeb4
-
SSDEEP
12288:cyRHom0coFpkMvzcQ6XDZiVtw0kJc+WClg7yMotOiVtniRemlW9AodXQuOckX:zl0cofk6zN6XDZiHVkq3IMXibGXgZQRv
Static task
static1
Behavioral task
behavioral1
Sample
3e1f3e1ef5336c11574f5903b0045ce9ac60bb783dba02018e2da62b7aa24858.exe
Resource
win7-20220812-en
Malware Config
Extracted
nanocore
1.2.1.1
jesus-christ.redirectme.net:54557
taskintelguard.ddns.net:54557
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
activate_away_mode
true
-
backup_connection_host
taskintelguard.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-09-18T05:15:02.280514336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54557
-
default_group
Project School
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
jesus-christ.redirectme.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Targets
-
-
Target
3e1f3e1ef5336c11574f5903b0045ce9ac60bb783dba02018e2da62b7aa24858
-
Size
737KB
-
MD5
1eb49342e98b994878513eafb305d19d
-
SHA1
b0f3cf44288f9eecb1ff45183e168276cb289f50
-
SHA256
3e1f3e1ef5336c11574f5903b0045ce9ac60bb783dba02018e2da62b7aa24858
-
SHA512
182dd6b93fda682c0a4ea5070a4a296cb52763808065ea9b32760a00cd043ebca6040197ddc1e9a29cbbf72ee6a822c58220ef31ce831269bfa64a1447cfeeb4
-
SSDEEP
12288:cyRHom0coFpkMvzcQ6XDZiVtw0kJc+WClg7yMotOiVtniRemlW9AodXQuOckX:zl0cofk6zN6XDZiHVkq3IMXibGXgZQRv
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-