General
-
Target
eff38ccbaa289120bb3501bd96f0ecc8_JaffaCakes118
-
Size
194KB
-
Sample
240921-rb57sawdjp
-
MD5
eff38ccbaa289120bb3501bd96f0ecc8
-
SHA1
a9a1227adf5270e21410a6dd536382c68891beb3
-
SHA256
d329235b98441762a8d76507e5f057682b55f2cf2773936983860c86591b9f5c
-
SHA512
f5bfadd5c7900a2da058d2a5976e11009b8342aa9e50bfe7475d1ddab49b7d1d1f43772c3a8ed580d18f04c8b0a783517e7c9166ccc28dc221bd301fe571086c
-
SSDEEP
3072:e8rgiEHh13pIlYPM44knMz47ej8RmPaEPDkaFn5vta70JN6fgNDWsyKfeVTWJH9I:Xpcb3PRhMM6GmPa8kE1LN6ohRWV2JG
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe
Resource
win7-20240903-en
Malware Config
Extracted
nanocore
1.2.2.0
swizz666.ddns.net:4141
127.0.0.1:4141
9e2d87fd-dfa6-4561-95f1-b9bc43662991
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
37.235.1.177
-
buffer_size
65535
-
build_time
2019-10-18T17:09:04.973830336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4141
-
default_group
LORDLORD
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
9e2d87fd-dfa6-4561-95f1-b9bc43662991
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
swizz666.ddns.net
-
primary_dns_server
37.235.1.174
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe
-
Size
232KB
-
MD5
d07af779817b39b6bcbc1fcdf2975251
-
SHA1
488bfa62a2fd93f5b1be98a3bc47c9bed90bfbf6
-
SHA256
3bd22b44d0b4a141383986eeef066479164316ab6dc14ce6c9c95365784e617b
-
SHA512
40dd24bb9159c21470098eb8272dd7c36f0e6c1b2f5a297bc3a5df53d740d758fc978259b7c6df26835f1bf01568a01e9c07e65316b8fe97506e4c170ad43d33
-
SSDEEP
3072:is7WyoaEZqhKH0oLRLlE/BP2Z1WbYb6VkJxWpFTT/0wmFT/3B5oRtHe8iG9/BPmy:3Roa/hK7X82BblY/T/2J5oRDN9JuftOB
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-