General

  • Target

    ab718c25c9ccd11b39765494d6f6ac4f_JaffaCakes118

  • Size

    274KB

  • Sample

    240819-r53zhszfla

  • MD5

    ab718c25c9ccd11b39765494d6f6ac4f

  • SHA1

    4a90a4e6e92428649af445c075cc5e0d4734ad86

  • SHA256

    8d74938e682b578cb67074aaf00f50034cdbcd2484c3f31bc9934f7afa3d9ce1

  • SHA512

    6daefccba261955244d4a9d8924668f617d0fe3ee35b23df2fc5af4dd0998d17f1f33d87f2ea0c7d9f409610a357e2c36a49ce680cd5cd49e2b427ae8b9a85e6

  • SSDEEP

    6144:prixnX3OG0wkOxKdsnDXjpYZglSlUCsvF8rG99xnImLRas5y:MR3DkSKdsn/yZglmU3F4y/nY

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

ijehawele.duckdns.org:1333

Mutex

8f20f6f8-5993-4e83-bf83-09b570dfe6eb

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    ijehawele.duckdns.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2018-11-28T22:24:48.363512636Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1333

  • default_group

    MUCHMONEY

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    8f20f6f8-5993-4e83-bf83-09b570dfe6eb

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    ijehawele.duckdns.org

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      TELEX-BL-393984-DRAFTCOP-POPDF093.scr

    • Size

      326KB

    • MD5

      1a45ff6479799c6275b1395806331dac

    • SHA1

      96d8fb6eb1f570fa0c79b9afdab5f39d36281d13

    • SHA256

      141cf9cb6a35eaba2eaf7285f891ee0cb1e25f2a8c02d99e681e3538f1921ac2

    • SHA512

      cf478a183521b1007028cc9a3397351de3b15ac4234f17fb0c5f68231db9714a7528a65ef5c408c043475e9b5031a0e67eb2d1f23d695b85f0006ca7d18a8d72

    • SSDEEP

      6144:l2SvdgnzDIUnrl92dtL8sYPE2Q7WgyvZhWd:l2SvuzEUnrlgdtlYsF7WgyvZC

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks