General
-
Target
RNSM00345.7z
-
Size
3.0MB
-
Sample
241110-tnbj2s1ajb
-
MD5
2936f6c721739b8fb55452e0916e6e1b
-
SHA1
47c23c9bf2692ea1cab5a0f6f59fd47f6da642ea
-
SHA256
49c4f9e21ec3b698c60215cb6072f73f25b6d7dd09064be86e1dfc184f50b06c
-
SHA512
f4874e79a8b69d8bd46e6b261e8b42aa557e11ddb328e0cf1901c9dd265e8c321e1a42cb0a060a0e99400b7f0af5c85abf70348206a8659fa465fdf879bf1016
-
SSDEEP
49152:91t6JJ+UADa5weGrqFva0dVF6xfikl/Jcjdh9vS44IVJeQz1JkRKpUg3oEaL:9LeA+GeHlL0iSqjdbvST4JR1pGEaL
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00345.7z
Resource
win7-20240903-en
Malware Config
Extracted
nanocore
1.2.2.0
95.141.43.202:1860
127.0.0.1:1860
47fe2d4d-2c23-4594-9173-9c075887e2b5
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-08-26T00:46:44.118475836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1860
-
default_group
NOVEMBER
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
47fe2d4d-2c23-4594-9173-9c075887e2b5
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
95.141.43.202
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
RNSM00345.7z
-
Size
3.0MB
-
MD5
2936f6c721739b8fb55452e0916e6e1b
-
SHA1
47c23c9bf2692ea1cab5a0f6f59fd47f6da642ea
-
SHA256
49c4f9e21ec3b698c60215cb6072f73f25b6d7dd09064be86e1dfc184f50b06c
-
SHA512
f4874e79a8b69d8bd46e6b261e8b42aa557e11ddb328e0cf1901c9dd265e8c321e1a42cb0a060a0e99400b7f0af5c85abf70348206a8659fa465fdf879bf1016
-
SSDEEP
49152:91t6JJ+UADa5weGrqFva0dVF6xfikl/Jcjdh9vS44IVJeQz1JkRKpUg3oEaL:9LeA+GeHlL0iSqjdbvST4JR1pGEaL
-
Nanocore family
-
Troldesh family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1