General
-
Target
nanocore.payload-disk
-
Size
202KB
-
Sample
230324-qd7b7aed98
-
MD5
b04416d2d65bb38583788e0fd7014776
-
SHA1
ce9d2ac275b4b1f3d5f3780b946f543c314de43d
-
SHA256
72af6210c216823ebf34b1bb4099a502bef3ab0cbc27fe26430189a0e4059095
-
SHA512
c4c8151eeefcb1818c748d88809f8b9601c29f24792b25f17dc1c835b3e0a274b20f1f372ef80342cb94e0e0a9a6e8b6383d1b962f03d1cf2d1342cff5a75d60
-
SSDEEP
6144:wLV6Bta6dtJmakIM5ntDv+1ECGhAIgeHYuz:wLV6Btpmk2b+kXxHY6
Behavioral task
behavioral1
Sample
nanocore.exe
Resource
win7-20230220-en
Malware Config
Extracted
nanocore
1.2.2.0
crotac.duckdns.org:5050
894f04bc-00c2-4900-831f-5a157aa1a453
-
activate_away_mode
true
-
backup_connection_host
crotac.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-01-03T09:47:24.491959836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5050
-
default_group
Ktrl
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
894f04bc-00c2-4900-831f-5a157aa1a453
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
crotac.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
nanocore.payload-disk
-
Size
202KB
-
MD5
b04416d2d65bb38583788e0fd7014776
-
SHA1
ce9d2ac275b4b1f3d5f3780b946f543c314de43d
-
SHA256
72af6210c216823ebf34b1bb4099a502bef3ab0cbc27fe26430189a0e4059095
-
SHA512
c4c8151eeefcb1818c748d88809f8b9601c29f24792b25f17dc1c835b3e0a274b20f1f372ef80342cb94e0e0a9a6e8b6383d1b962f03d1cf2d1342cff5a75d60
-
SSDEEP
6144:wLV6Bta6dtJmakIM5ntDv+1ECGhAIgeHYuz:wLV6Btpmk2b+kXxHY6
-