General
-
Target
309948e38ab36ee975b9fdc3827c605d33c245ef469ee15d4f988d33a89a0f40
-
Size
742KB
-
Sample
221127-wkzhtaga54
-
MD5
1f368b14129c0f517220322fd866cc0f
-
SHA1
b16c605a1f4a015dc95451e4650c188984b0a567
-
SHA256
309948e38ab36ee975b9fdc3827c605d33c245ef469ee15d4f988d33a89a0f40
-
SHA512
6518b281928536a9641a7b0ad746c90682875402dc574fe89f499f7e43abe6cfcbd2516ca5b0f2b590ca8554716631ea4fbe5865dfd2a9f521996a4243fb4450
-
SSDEEP
12288:WbTS2Zke7N7GXrT/U/T4xZI9eGVN2nffxqAQLAPbWxykx2U+WGv7CAnw6J:AWLENqwUxZIH2PQcP0ykj4e+ws
Static task
static1
Behavioral task
behavioral1
Sample
309948e38ab36ee975b9fdc3827c605d33c245ef469ee15d4f988d33a89a0f40.exe
Resource
win7-20221111-en
Malware Config
Extracted
nanocore
1.2.1.1
jesus-christ.redirectme.net:54557
taskintelguard.ddns.net:54557
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
activate_away_mode
true
-
backup_connection_host
taskintelguard.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-09-18T05:15:02.280514336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54557
-
default_group
Project School
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
jesus-christ.redirectme.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Targets
-
-
Target
309948e38ab36ee975b9fdc3827c605d33c245ef469ee15d4f988d33a89a0f40
-
Size
742KB
-
MD5
1f368b14129c0f517220322fd866cc0f
-
SHA1
b16c605a1f4a015dc95451e4650c188984b0a567
-
SHA256
309948e38ab36ee975b9fdc3827c605d33c245ef469ee15d4f988d33a89a0f40
-
SHA512
6518b281928536a9641a7b0ad746c90682875402dc574fe89f499f7e43abe6cfcbd2516ca5b0f2b590ca8554716631ea4fbe5865dfd2a9f521996a4243fb4450
-
SSDEEP
12288:WbTS2Zke7N7GXrT/U/T4xZI9eGVN2nffxqAQLAPbWxykx2U+WGv7CAnw6J:AWLENqwUxZIH2PQcP0ykj4e+ws
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-