General
-
Target
5e8dc728ccc9d767556351725e84c72e0ece0362985ab8da128da195cdf112cc
-
Size
789KB
-
Sample
221128-xxxenaea9s
-
MD5
13de7bad1f02548b1e13dcd504389e70
-
SHA1
c761dba15b082454540a22c771f1a6d8dda3c105
-
SHA256
5e8dc728ccc9d767556351725e84c72e0ece0362985ab8da128da195cdf112cc
-
SHA512
f50c8ade2174c50f4d82c7f9034c4d46bc425968cea393557f0520b0789173a45334cb9b0352942de67cebd1263b2286775e09a9e4137a97267d9df48512bd85
-
SSDEEP
12288:QhRRdnqMauAsLgYFHqw9AU9aMAxxU3LtsHC20Rg9g:Qhj9mpsLdtXdO
Static task
static1
Behavioral task
behavioral1
Sample
5e8dc728ccc9d767556351725e84c72e0ece0362985ab8da128da195cdf112cc.exe
Resource
win7-20221111-en
Malware Config
Extracted
nanocore
1.2.2.0
worldboys.mooo.com:1234
b2689a7b-4226-49b2-8063-88c0ee8362f2
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2014-12-06T18:28:31.503035836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1234
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b2689a7b-4226-49b2-8063-88c0ee8362f2
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
worldboys.mooo.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
5e8dc728ccc9d767556351725e84c72e0ece0362985ab8da128da195cdf112cc
-
Size
789KB
-
MD5
13de7bad1f02548b1e13dcd504389e70
-
SHA1
c761dba15b082454540a22c771f1a6d8dda3c105
-
SHA256
5e8dc728ccc9d767556351725e84c72e0ece0362985ab8da128da195cdf112cc
-
SHA512
f50c8ade2174c50f4d82c7f9034c4d46bc425968cea393557f0520b0789173a45334cb9b0352942de67cebd1263b2286775e09a9e4137a97267d9df48512bd85
-
SSDEEP
12288:QhRRdnqMauAsLgYFHqw9AU9aMAxxU3LtsHC20Rg9g:Qhj9mpsLdtXdO
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-