General
-
Target
562fc3234e53c14974bd59e5008f264438e67849ddaf11f06c4687fdd2da5311.bin.sample.gz
-
Size
1.1MB
-
Sample
230516-pw833ahh21
-
MD5
4d256d8e0e817b68fb4795dd30b9297f
-
SHA1
fbb0784f30bc9f59a6ccd465c9d89c0f55059c5d
-
SHA256
addf69e7675bb4111997e21630447883474f34e0faf50215b7ac45595a042300
-
SHA512
227e3033631202d59c84496cd54a3f1c7fd06541c150a066622af8e834d3bf5148d443a6ec9059e599c40dcdefbfde6d3ed0a28db5bc9eb370d6504d2efa2520
-
SSDEEP
24576:MuLdsbeXlkwvHknDI7SERIsoHLrhI17Tpb1/e431vSkBil:PsUiwcns7Te3HLdI1Cqv7il
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Malware Config
Extracted
nanocore
1.2.2.0
syoll.duckdns.org:1604
91a498dd-ff55-4709-b992-a5ee7715c9a2
-
activate_away_mode
false
-
backup_connection_host
syoll.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-14T21:41:26.733185836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1604
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
91a498dd-ff55-4709-b992-a5ee7715c9a2
-
mutex_timeout
4985
-
prevent_system_sleep
false
-
primary_connection_host
syoll.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
sample
-
Size
2.1MB
-
MD5
ae177e42c4c6e273cb4219fff5e94981
-
SHA1
9b4c628e9aa7a81ada28dd4ba2490cef3a5ccede
-
SHA256
562fc3234e53c14974bd59e5008f264438e67849ddaf11f06c4687fdd2da5311
-
SHA512
b34261b51110f1b055fe6cd283d51620fc1c0d0cd25c87587cc434ea04074aa0ed1ad43f270383453b76b69db3cbf5708a21cf10948f874123d5fef09348ceba
-
SSDEEP
24576:LE1qXbolTK38T67YCE3DY1oNowiK33tQPtY6Zqx8dYkRQ53Ula4mJ8ZQI+QSD11a:LEMoVl3zWwx0qxnkRGcQI+1ZvWH
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-