General

  • Target

    Vanta Loader.exe

  • Size

    203KB

  • Sample

    241213-c6jvpsxpeq

  • MD5

    79f7a0a3ba719b25ca6166e794f7d2f1

  • SHA1

    80bf9c6c15c5d6bae6970f0a6d96f17525e4f2d8

  • SHA256

    a427b8231cb4b763971bba0105900049e70309c6fb1d9c2ab975f01e6d9533ed

  • SHA512

    340401e6d0cf89daa8dd934102261e8e4c15387a9341f0678d785308f41c6ca91794c3c59dea0180dbbd956d9a2fea6e10910824d462aa4e26d4277ca7e8fa0f

  • SSDEEP

    3072:AzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIlTpbjZhDkIIRL+XYMQbWmlekJ:ALV6Bta6dtJmakIM5cz9XYMQb3bYbxls

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

military-containers.gl.at.ply.gg:52683

127.0.0.1:52683

Mutex

96a43337-0043-409a-ab2a-59f3539ed5bb

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

  • buffer_size

    65535

  • build_time

    2024-09-24T04:20:18.113881136Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    3991

  • connection_port

    52683

  • default_group

    Vanta

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    96a43337-0043-409a-ab2a-59f3539ed5bb

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    military-containers.gl.at.ply.gg

  • primary_dns_server

  • request_elevation

    false

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    false

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      Vanta Loader.exe

    • Size

      203KB

    • MD5

      79f7a0a3ba719b25ca6166e794f7d2f1

    • SHA1

      80bf9c6c15c5d6bae6970f0a6d96f17525e4f2d8

    • SHA256

      a427b8231cb4b763971bba0105900049e70309c6fb1d9c2ab975f01e6d9533ed

    • SHA512

      340401e6d0cf89daa8dd934102261e8e4c15387a9341f0678d785308f41c6ca91794c3c59dea0180dbbd956d9a2fea6e10910824d462aa4e26d4277ca7e8fa0f

    • SSDEEP

      3072:AzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIlTpbjZhDkIIRL+XYMQbWmlekJ:ALV6Bta6dtJmakIM5cz9XYMQb3bYbxls

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks