General
-
Target
1d75d3756cf8f649a81b741b86b6c89b
-
Size
1.3MB
-
Sample
231225-pd8dtabed8
-
MD5
1d75d3756cf8f649a81b741b86b6c89b
-
SHA1
33984fa4514e704f12f3b9268077790d9481b2ce
-
SHA256
bc16c48ef4435300121e3e14fd1b06c27447935e7fb14166f1cd7d16e0fc1fa3
-
SHA512
439c21c474a31df48c060abca7736e31e054426ae3f351e71c03d07d0663344e1787a93e759467071d7bdbc7a5593199109a14ab58a71ca00128c00b8e8c933e
-
SSDEEP
24576:qNLS/d3LKzks6ksazEwRUWzqMccQTF3PsFC6syy8jh8N6ZNcZ:1KhwwiWzccQpfs8GeN6ZNc
Static task
static1
Behavioral task
behavioral1
Sample
1d75d3756cf8f649a81b741b86b6c89b.exe
Resource
win7-20231215-en
Malware Config
Extracted
nanocore
1.2.2.0
185.140.53.253:1604
dedicatedlambo9.ddns.net:1604
c9622013-90b3-4810-9b2a-2fbba1723547
-
activate_away_mode
true
-
backup_connection_host
dedicatedlambo9.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-03-12T17:58:20.881773936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1604
-
default_group
agro pogba
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
c9622013-90b3-4810-9b2a-2fbba1723547
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
185.140.53.253
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
1d75d3756cf8f649a81b741b86b6c89b
-
Size
1.3MB
-
MD5
1d75d3756cf8f649a81b741b86b6c89b
-
SHA1
33984fa4514e704f12f3b9268077790d9481b2ce
-
SHA256
bc16c48ef4435300121e3e14fd1b06c27447935e7fb14166f1cd7d16e0fc1fa3
-
SHA512
439c21c474a31df48c060abca7736e31e054426ae3f351e71c03d07d0663344e1787a93e759467071d7bdbc7a5593199109a14ab58a71ca00128c00b8e8c933e
-
SSDEEP
24576:qNLS/d3LKzks6ksazEwRUWzqMccQTF3PsFC6syy8jh8N6ZNcZ:1KhwwiWzccQpfs8GeN6ZNc
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-