General
-
Target
bbcd72e82d0511c6fda963e60a70d942e39e36e37ac225f75f3f5b9aa96b3e17exe.exe
-
Size
476KB
-
Sample
231205-wxnbbadh3v
-
MD5
2afed36792d08f83bca5877f808612f2
-
SHA1
fdc5f037f4d5b27c476f3ecb987810d90c40ff95
-
SHA256
bbcd72e82d0511c6fda963e60a70d942e39e36e37ac225f75f3f5b9aa96b3e17
-
SHA512
7a0de4f310101b73ad6736e01661244394aa0495e297f57bdee852d4005e9961554120ea2efa111090bba6b1545a48acd5ff2a96dedec92ac0735fc76f805b42
-
SSDEEP
6144:b8LxBnaL3xX0XBxA4a76P34sAkTJDk/+rNx0kFGE/LK3auc17tTcGrAwDVaAX:aaLWXpa7u343IJ4+Zx0Qci1rU8o6
Static task
static1
Behavioral task
behavioral1
Sample
bbcd72e82d0511c6fda963e60a70d942e39e36e37ac225f75f3f5b9aa96b3e17exe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bbcd72e82d0511c6fda963e60a70d942e39e36e37ac225f75f3f5b9aa96b3e17exe.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
nanocore
1.2.2.0
multipleentry90dayscontroller.homingbeacon.net:54980
6df769ca-fa90-4d27-be6c-663c699e6628
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-07-28T11:56:28.201018636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54980
-
default_group
K59
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
6df769ca-fa90-4d27-be6c-663c699e6628
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
multipleentry90dayscontroller.homingbeacon.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
bbcd72e82d0511c6fda963e60a70d942e39e36e37ac225f75f3f5b9aa96b3e17exe.exe
-
Size
476KB
-
MD5
2afed36792d08f83bca5877f808612f2
-
SHA1
fdc5f037f4d5b27c476f3ecb987810d90c40ff95
-
SHA256
bbcd72e82d0511c6fda963e60a70d942e39e36e37ac225f75f3f5b9aa96b3e17
-
SHA512
7a0de4f310101b73ad6736e01661244394aa0495e297f57bdee852d4005e9961554120ea2efa111090bba6b1545a48acd5ff2a96dedec92ac0735fc76f805b42
-
SSDEEP
6144:b8LxBnaL3xX0XBxA4a76P34sAkTJDk/+rNx0kFGE/LK3auc17tTcGrAwDVaAX:aaLWXpa7u343IJ4+Zx0Qci1rU8o6
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-