General

  • Target

    eff38ccbaa289120bb3501bd96f0ecc8_JaffaCakes118

  • Size

    194KB

  • Sample

    240921-rb57sawdjp

  • MD5

    eff38ccbaa289120bb3501bd96f0ecc8

  • SHA1

    a9a1227adf5270e21410a6dd536382c68891beb3

  • SHA256

    d329235b98441762a8d76507e5f057682b55f2cf2773936983860c86591b9f5c

  • SHA512

    f5bfadd5c7900a2da058d2a5976e11009b8342aa9e50bfe7475d1ddab49b7d1d1f43772c3a8ed580d18f04c8b0a783517e7c9166ccc28dc221bd301fe571086c

  • SSDEEP

    3072:e8rgiEHh13pIlYPM44knMz47ej8RmPaEPDkaFn5vta70JN6fgNDWsyKfeVTWJH9I:Xpcb3PRhMM6GmPa8kE1LN6ohRWV2JG

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

swizz666.ddns.net:4141

127.0.0.1:4141

Mutex

9e2d87fd-dfa6-4561-95f1-b9bc43662991

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    37.235.1.177

  • buffer_size

    65535

  • build_time

    2019-10-18T17:09:04.973830336Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    4141

  • default_group

    LORDLORD

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    9e2d87fd-dfa6-4561-95f1-b9bc43662991

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    swizz666.ddns.net

  • primary_dns_server

    37.235.1.174

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe

    • Size

      232KB

    • MD5

      d07af779817b39b6bcbc1fcdf2975251

    • SHA1

      488bfa62a2fd93f5b1be98a3bc47c9bed90bfbf6

    • SHA256

      3bd22b44d0b4a141383986eeef066479164316ab6dc14ce6c9c95365784e617b

    • SHA512

      40dd24bb9159c21470098eb8272dd7c36f0e6c1b2f5a297bc3a5df53d740d758fc978259b7c6df26835f1bf01568a01e9c07e65316b8fe97506e4c170ad43d33

    • SSDEEP

      3072:is7WyoaEZqhKH0oLRLlE/BP2Z1WbYb6VkJxWpFTT/0wmFT/3B5oRtHe8iG9/BPmy:3Roa/hK7X82BblY/T/2J5oRDN9JuftOB

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks