General
-
Target
konotaverse2.1.exe
-
Size
1.3MB
-
Sample
240125-w41vzscgc2
-
MD5
e646eccc6a2a4ae885d9d96e8fa83926
-
SHA1
5b1c47f1964855303b6de48e224e9baa8a9ae236
-
SHA256
00e69bcba637723de4f9a380800be9b813def689a4d150e0879ef43e3c613361
-
SHA512
fd79016cd33c875d84ed1f60dd466eca936ed2ec4c75a94fe31302db4c4a3bd15d33037213acb50d5eb60cb1a47e1949ccc9891b6e75e4011ba2e4c3f57b364c
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXMmHaijwggs5v1WsvG4HYRljoK5:Vh+ZkldoPK8YaYostxG4HYzh
Static task
static1
Behavioral task
behavioral1
Sample
konotaverse2.1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
konotaverse2.1.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
nanocore
1.2.2.0
jogard.duckdns.org:6513
0bcef9ae-1ad9-450b-8199-18ecd78eee45
-
activate_away_mode
true
-
backup_connection_host
jogard.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-11-03T06:11:28.219071236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6513
-
default_group
Grade7
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
0bcef9ae-1ad9-450b-8199-18ecd78eee45
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
jogard.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
konotaverse2.1.exe
-
Size
1.3MB
-
MD5
e646eccc6a2a4ae885d9d96e8fa83926
-
SHA1
5b1c47f1964855303b6de48e224e9baa8a9ae236
-
SHA256
00e69bcba637723de4f9a380800be9b813def689a4d150e0879ef43e3c613361
-
SHA512
fd79016cd33c875d84ed1f60dd466eca936ed2ec4c75a94fe31302db4c4a3bd15d33037213acb50d5eb60cb1a47e1949ccc9891b6e75e4011ba2e4c3f57b364c
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXMmHaijwggs5v1WsvG4HYRljoK5:Vh+ZkldoPK8YaYostxG4HYzh
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-