General

  • Target

    268-67-0x0000000000400000-0x0000000000438000-memory.dmp

  • Size

    224KB

  • MD5

    732520ec9ed0f5f617445f2e238e8320

  • SHA1

    e7f0de8eb0c8d89b81ed77f043b260dc4885d135

  • SHA256

    795659c58ac46bbea6fae3293c1f1f357e2814c4e9a4d6576de5a62dff9354ef

  • SHA512

    a9294c29ddf90f55e4fcfa0ac36650ced9a7ea628ed47cd757a9edac54f98b665454af195d6268d57fa845195a8745f9beeadd04a31cc3b85eb285baf27d376b

  • SSDEEP

    6144:wLV6Bta6dtJmakIM5SjaSdHlHMLHLpnN5:wLV6BtpmkV3FmHLpnN5

Score
10/10

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

podzeye.duckdns.org:414

Mutex

8016d6d7-9a9c-4266-8244-58d40eab2ad4

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2021-06-25T23:55:58.949928336Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    414

  • default_group

    Mba-Month

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    8016d6d7-9a9c-4266-8244-58d40eab2ad4

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    podzeye.duckdns.org

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • Nanocore family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 268-67-0x0000000000400000-0x0000000000438000-memory.dmp
    .exe windows x86


    Headers

    Sections