General

  • Target

    27b04b42d5706f5e29f7eb80e232d6d0N

  • Size

    282KB

  • Sample

    240908-wr9x5asdma

  • MD5

    27b04b42d5706f5e29f7eb80e232d6d0

  • SHA1

    8baddc8fe43478936c7b3571468be68832b03890

  • SHA256

    536487a863b91906226c0697373b5374e78246dc58bcb9afa281676901080277

  • SHA512

    1167d68007e053b89038796203757424fda5fe2387748ba3dfbecc26107c91cbe958ef2c8bfdea302e0fc5b2c312529d802a6b931f8cc3809a754399b9aef7e8

  • SSDEEP

    6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfz:boSeGUA5YZazpXUmZhZ6SS

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

sysupdate24.ddns.net:45400

Mutex

ae82ab7f-db07-49ee-9d2b-76075d76f37f

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

  • buffer_size

    65535

  • build_time

    2020-04-24T17:41:53.492468936Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    45400

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    ae82ab7f-db07-49ee-9d2b-76075d76f37f

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    sysupdate24.ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      27b04b42d5706f5e29f7eb80e232d6d0N

    • Size

      282KB

    • MD5

      27b04b42d5706f5e29f7eb80e232d6d0

    • SHA1

      8baddc8fe43478936c7b3571468be68832b03890

    • SHA256

      536487a863b91906226c0697373b5374e78246dc58bcb9afa281676901080277

    • SHA512

      1167d68007e053b89038796203757424fda5fe2387748ba3dfbecc26107c91cbe958ef2c8bfdea302e0fc5b2c312529d802a6b931f8cc3809a754399b9aef7e8

    • SSDEEP

      6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfz:boSeGUA5YZazpXUmZhZ6SS

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.