General

  • Target

    3dc0c78933138e58d8afea911c4b48ac_JaffaCakes118

  • Size

    262KB

  • Sample

    240514-d8sq3ahh73

  • MD5

    3dc0c78933138e58d8afea911c4b48ac

  • SHA1

    b2d2654b905de7b3949d370ebfe1db8e7b3fb456

  • SHA256

    39355d4f0a52bdcfe7b1e58422da1ea60556e80ab090956fc80a5d00b3880b32

  • SHA512

    64f41447f3003265bd1f5c0f6ac19a57f7081c941b86489499ad1678b535cceadbd2b8f26a5c096e81636c873c57ee49593175d58737a64be9fd10f25d3a87d8

  • SSDEEP

    6144:Jdm9D0Bvk9n9gQ5nfdXs4WfGX6RYKcaycsS60BpPCTq6rDOn:J4avkT5nB1fXsYKcaycswHPaY

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

bukis228.ddns.net:2888

Mutex

dd75f1a0-78c6-45b9-8931-1e71fe5f970c

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    bukis228.ddns.net

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2019-01-27T07:09:50.233433736Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    2888

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    dd75f1a0-78c6-45b9-8931-1e71fe5f970c

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      PO001704201900-xls.exe

    • Size

      381KB

    • MD5

      813a527a915620cffa5757eb6bccbb75

    • SHA1

      ce17f93a8dedf7f00524e2552500904f54fbbaf1

    • SHA256

      5896c651bc097a23e0e8eff8264991d4f8337a3dc528c0a123c9c3eb19c1c080

    • SHA512

      adc9cf77b95643e047160df842b6533033c318e93361b5f4b80d887fcb2fe789007f7bf381dd82532bcfe310ac82e258af0a6a8c6f836944b3d3c9a8f2707b7a

    • SSDEEP

      6144:8y7Vetai/7NkM6KArLBx88f5unHcsY60BzPCTC6J5:8yx2L8LNGIunHcsmdPMb

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks