General
-
Target
A5300EB8884F0263472F5D210F90B7EC.exe
-
Size
202KB
-
Sample
240818-2h8atsydje
-
MD5
a5300eb8884f0263472f5d210f90b7ec
-
SHA1
9cafcfa484f7cbca00f46e9f940fb8bcb76bb00b
-
SHA256
a0a4a86c7a612d31e6470cbe01693ccc6190d4aef4cda0735360cc95194708b2
-
SHA512
023f0ab4cb82b31d4cba0373a2ccdcae6d98c3201b9b0d5c4c4d6369514860037ddcfca523918d25b08f15e24412ff8192f8c3c4e2cf82835b65b4878b1bd6ba
-
SSDEEP
6144:QLV6Bta6dtJmakIM5EtDv+1ECGhAIgeHYu8:QLV6Btpmkxb+kXxHY5
Behavioral task
behavioral1
Sample
A5300EB8884F0263472F5D210F90B7EC.exe
Resource
win7-20240708-en
Malware Config
Extracted
nanocore
1.2.2.0
host-knight.gl.at.ply.gg:46981
127.0.0.1:46981
f6d457e0-9ea7-4597-895c-3a6db72b6018
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-05-26T22:14:53.607111536Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
46981
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f6d457e0-9ea7-4597-895c-3a6db72b6018
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
host-knight.gl.at.ply.gg
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
A5300EB8884F0263472F5D210F90B7EC.exe
-
Size
202KB
-
MD5
a5300eb8884f0263472f5d210f90b7ec
-
SHA1
9cafcfa484f7cbca00f46e9f940fb8bcb76bb00b
-
SHA256
a0a4a86c7a612d31e6470cbe01693ccc6190d4aef4cda0735360cc95194708b2
-
SHA512
023f0ab4cb82b31d4cba0373a2ccdcae6d98c3201b9b0d5c4c4d6369514860037ddcfca523918d25b08f15e24412ff8192f8c3c4e2cf82835b65b4878b1bd6ba
-
SSDEEP
6144:QLV6Bta6dtJmakIM5EtDv+1ECGhAIgeHYu8:QLV6Btpmkxb+kXxHY5
-