General
-
Target
chrome.exe
-
Size
583KB
-
Sample
230220-sngkmaag9z
-
MD5
42ee1ad3b4600a955888780e8899c1ce
-
SHA1
4ba8b368c32fa57703613e0c98d90381b872d5ad
-
SHA256
caf073b1d85bc136488382be2c83c264ac64d2df279752341b1c4601c6201a41
-
SHA512
42063774445da72a55fd97b8a614275993ac7def057efea876e2bafca5a4560c553a450252157a662364e58734d221632547f1e776d7bd8b600ca4c127c03665
-
SSDEEP
12288:L5Z+mqofs6TaXML3crUlbIInrHR2Fwn6DijBtpl2i6F+0cfjoop:tUJN9MwrfInrHvnY7ipzoop
Static task
static1
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
nanocore
1.2.2.0
212.87.204.153:6100
ea7f103c-d9e6-4f82-9646-8d28f9c28502
-
activate_away_mode
true
-
backup_connection_host
212.87.204.153
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-12-02T00:16:59.005970036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6100
-
default_group
GRACE
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ea7f103c-d9e6-4f82-9646-8d28f9c28502
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
212.87.204.153
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
chrome.exe
-
Size
583KB
-
MD5
42ee1ad3b4600a955888780e8899c1ce
-
SHA1
4ba8b368c32fa57703613e0c98d90381b872d5ad
-
SHA256
caf073b1d85bc136488382be2c83c264ac64d2df279752341b1c4601c6201a41
-
SHA512
42063774445da72a55fd97b8a614275993ac7def057efea876e2bafca5a4560c553a450252157a662364e58734d221632547f1e776d7bd8b600ca4c127c03665
-
SSDEEP
12288:L5Z+mqofs6TaXML3crUlbIInrHR2Fwn6DijBtpl2i6F+0cfjoop:tUJN9MwrfInrHvnY7ipzoop
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-