General
-
Target
scopat2.1.exe
-
Size
383KB
-
Sample
230324-p934zaed83
-
MD5
06bb3e6845c05801adc2f8d3d85cd188
-
SHA1
ef7a48d42513d860bfed62e5fa41efcd79d860c8
-
SHA256
4c39d7bc897c365a5c93f4fa958362f6e98d6cbdf8f7dcd9f84aa16caa972855
-
SHA512
c8a6d377ce6a595b55701ed95e375e450a816062c11b46779c9d461792d17953c08af966a35c30c996161af4125344d06c3eb28f1a00ccf0c65dfc103af955ea
-
SSDEEP
6144:gYa6oyf4GW0T3aXVgMUtBxFPg3leoyr9ZoMCAWEHmim3hEd+SJ5VDEx0psOkqX5V:gY2yfCXVgHfx8l09ZoMdd5msOciN0
Static task
static1
Behavioral task
behavioral1
Sample
scopat2.1.exe
Resource
win7-20230220-en
Malware Config
Extracted
nanocore
1.2.2.0
crotac.duckdns.org:5050
894f04bc-00c2-4900-831f-5a157aa1a453
-
activate_away_mode
true
-
backup_connection_host
crotac.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-01-03T09:47:24.491959836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5050
-
default_group
Ktrl
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
894f04bc-00c2-4900-831f-5a157aa1a453
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
crotac.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
scopat2.1.exe
-
Size
383KB
-
MD5
06bb3e6845c05801adc2f8d3d85cd188
-
SHA1
ef7a48d42513d860bfed62e5fa41efcd79d860c8
-
SHA256
4c39d7bc897c365a5c93f4fa958362f6e98d6cbdf8f7dcd9f84aa16caa972855
-
SHA512
c8a6d377ce6a595b55701ed95e375e450a816062c11b46779c9d461792d17953c08af966a35c30c996161af4125344d06c3eb28f1a00ccf0c65dfc103af955ea
-
SSDEEP
6144:gYa6oyf4GW0T3aXVgMUtBxFPg3leoyr9ZoMCAWEHmim3hEd+SJ5VDEx0psOkqX5V:gY2yfCXVgHfx8l09ZoMdd5msOciN0
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-