General
-
Target
42BE3BED9261FBAE0A0AED767EBD88C0.exe
-
Size
202KB
-
Sample
240408-2j4n2adg99
-
MD5
42be3bed9261fbae0a0aed767ebd88c0
-
SHA1
6630748f26ac9e3a8d19cb43eeacd77d506b1808
-
SHA256
c1d29284b6d4ae244712dd49661841b36a6de2387cad6ab55388b22769151878
-
SHA512
bf522bb82bdee59a355043b0af17c42bf79b1d4e59120d3fb9ffcb96aad369d221b60af1106b29c51286a94d95ccfc80cc69421590c20a9984c73d61174a7c7b
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIGYcsD6RA5E3bKKiCf3e0kYrOV:QLV6Bta6dtJmakIM5gcs8A5ELiUfoZ
Behavioral task
behavioral1
Sample
42BE3BED9261FBAE0A0AED767EBD88C0.exe
Resource
win7-20240221-en
Malware Config
Extracted
nanocore
1.2.2.0
appdiscordgg.duckdns.org:54984
3fa24a10-d92a-416f-bc41-cdd7b2f6e7ab
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-01-17T00:53:56.881316036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54984
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
3fa24a10-d92a-416f-bc41-cdd7b2f6e7ab
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
appdiscordgg.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
cybergate
v1.02.1
Lammer
appdiscordgg.duckdns.org:81
appdiscordgg.duckdns.org:80
Pluguin
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
Microsoft
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
123
-
regkey_hkcu
Microsoft
-
regkey_hklm
Microsoft
Targets
-
-
Target
42BE3BED9261FBAE0A0AED767EBD88C0.exe
-
Size
202KB
-
MD5
42be3bed9261fbae0a0aed767ebd88c0
-
SHA1
6630748f26ac9e3a8d19cb43eeacd77d506b1808
-
SHA256
c1d29284b6d4ae244712dd49661841b36a6de2387cad6ab55388b22769151878
-
SHA512
bf522bb82bdee59a355043b0af17c42bf79b1d4e59120d3fb9ffcb96aad369d221b60af1106b29c51286a94d95ccfc80cc69421590c20a9984c73d61174a7c7b
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIGYcsD6RA5E3bKKiCf3e0kYrOV:QLV6Bta6dtJmakIM5gcs8A5ELiUfoZ
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-