General
-
Target
30bae935005990041e4f5336f82484a9fe9f57f432244e88cceca2044624ffb0
-
Size
302KB
-
Sample
240831-pcgjpssejd
-
MD5
f8e41c8d052835f8e046fba0eac86e5c
-
SHA1
2e22ae28c191673016d938460405588011c988e4
-
SHA256
30bae935005990041e4f5336f82484a9fe9f57f432244e88cceca2044624ffb0
-
SHA512
f6de118de2230d22c1d604c594dbec672f5fa00d66988cd88e2fcf12d4e01127984216f759f7d81137af5dcd17b8495770421ce82cdf7d9fa9e88dfb333f4903
-
SSDEEP
6144:PTYyoMacUKW9iD5GE4poz9bGIAi2ii9xRaePJVSWL/yB6Q7dfW:E1M5+idGE4pm9bGIAi2fXPJhyd7du
Static task
static1
Behavioral task
behavioral1
Sample
5d192cc1e5d9569479192b9ca7147953428158484ab4f5c0480ad220688fbfce.exe
Resource
win7-20240708-en
Malware Config
Extracted
nanocore
1.2.2.0
185.157.160.229:60006
neoncorex.duckdns.org:60006
1d5c6a3e-60c1-4684-aee7-fbdc0338bfa0
-
activate_away_mode
true
-
backup_connection_host
neoncorex.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-07-29T18:43:26.772131836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
60006
-
default_group
NANOSHIELD
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1d5c6a3e-60c1-4684-aee7-fbdc0338bfa0
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
185.157.160.229
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
5d192cc1e5d9569479192b9ca7147953428158484ab4f5c0480ad220688fbfce
-
Size
479KB
-
MD5
6102daa4935e016dea8dc3eec27d2ac1
-
SHA1
c5320bd4d54b856aa90bc7a92ca9ce5dc22e70ca
-
SHA256
5d192cc1e5d9569479192b9ca7147953428158484ab4f5c0480ad220688fbfce
-
SHA512
92d0683cc73ea1479426a5869cc66be21b28482069af8c8fceb69ea183d978d5f600323011c7944a1b618b11e3a56d4371aaf8dcc3238098c4388eccd5115b51
-
SSDEEP
12288:P2yRPHfLlUN7Fl1dYySBrNoZZDetBHGTRNj:97wAySdNorDgBHGTRNj
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-