General
-
Target
ce6c198f957781e58d4d0982a581ecd6c36f552fdfbf7874115c0a9be70ca98f
-
Size
202KB
-
Sample
241103-2fsscsypak
-
MD5
a767af4cb0739db3627d5ec035284a7d
-
SHA1
44f1f8935d96545e6667ba5baba33b2ea424e1b8
-
SHA256
ce6c198f957781e58d4d0982a581ecd6c36f552fdfbf7874115c0a9be70ca98f
-
SHA512
1b64b776807de3cf89dcb3f7b42933f1fab16cecf7c6dd5597d550d0a7fd34f556d8ecb059c0d81cf178ebf23a7cfacbfcbfbffeaba3a86d53f675ce83a16b18
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HI4WcZVg9FMMywQakxalJRs:QLV6Bta6dtJmakIM5hVgLMMywQVols
Behavioral task
behavioral1
Sample
ce6c198f957781e58d4d0982a581ecd6c36f552fdfbf7874115c0a9be70ca98f.exe
Resource
win7-20240708-en
Malware Config
Extracted
nanocore
1.2.2.0
7.tcp.eu.ngrok.io:18009
127.0.0.1:18009
b124183f-3445-43a8-ab39-9c935e1797e1
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-04-01T15:36:13.636105236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
18009
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b124183f-3445-43a8-ab39-9c935e1797e1
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
7.tcp.eu.ngrok.io
-
primary_dns_server
7.tcp.eu.ngrok.io
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
ce6c198f957781e58d4d0982a581ecd6c36f552fdfbf7874115c0a9be70ca98f
-
Size
202KB
-
MD5
a767af4cb0739db3627d5ec035284a7d
-
SHA1
44f1f8935d96545e6667ba5baba33b2ea424e1b8
-
SHA256
ce6c198f957781e58d4d0982a581ecd6c36f552fdfbf7874115c0a9be70ca98f
-
SHA512
1b64b776807de3cf89dcb3f7b42933f1fab16cecf7c6dd5597d550d0a7fd34f556d8ecb059c0d81cf178ebf23a7cfacbfcbfbffeaba3a86d53f675ce83a16b18
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HI4WcZVg9FMMywQakxalJRs:QLV6Bta6dtJmakIM5hVgLMMywQVols
-
Nanocore family
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-