General
-
Target
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52
-
Size
736KB
-
Sample
221127-wsgyqsgf37
-
MD5
0aab2e68a3f6117d5cda549950b298be
-
SHA1
cb3c7ed6f9ac7934380c87f4d746f5d830ecbc32
-
SHA256
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52
-
SHA512
e8817d56433720c5715c91ade2e7d10b89279ebe676d190ba8e3a97494f6235b5ebf2136b2116c265ff771c4119a7d0784ed1e566d9949b43e40c80814cab427
-
SSDEEP
12288:uXtySSKrOrVlYZhTJUqZpB0WKPYTUp0nMyseIn1MNttoxinDaSZVH9KUyfCA444:6SKUylUq3+6Up0MBdn6NDSinDayH/I
Static task
static1
Behavioral task
behavioral1
Sample
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe
Resource
win7-20221111-en
Malware Config
Extracted
nanocore
1.2.1.1
jesus-christ.redirectme.net:54557
taskintelguard.ddns.net:54557
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
activate_away_mode
true
-
backup_connection_host
taskintelguard.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-09-18T05:15:02.280514336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54557
-
default_group
Project School
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
jesus-christ.redirectme.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Targets
-
-
Target
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52
-
Size
736KB
-
MD5
0aab2e68a3f6117d5cda549950b298be
-
SHA1
cb3c7ed6f9ac7934380c87f4d746f5d830ecbc32
-
SHA256
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52
-
SHA512
e8817d56433720c5715c91ade2e7d10b89279ebe676d190ba8e3a97494f6235b5ebf2136b2116c265ff771c4119a7d0784ed1e566d9949b43e40c80814cab427
-
SSDEEP
12288:uXtySSKrOrVlYZhTJUqZpB0WKPYTUp0nMyseIn1MNttoxinDaSZVH9KUyfCA444:6SKUylUq3+6Up0MBdn6NDSinDayH/I
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-