General

  • Target

    JaffaCakes118_6102daa4935e016dea8dc3eec27d2ac1

  • Size

    479KB

  • Sample

    250101-2ck84szpdl

  • MD5

    6102daa4935e016dea8dc3eec27d2ac1

  • SHA1

    c5320bd4d54b856aa90bc7a92ca9ce5dc22e70ca

  • SHA256

    5d192cc1e5d9569479192b9ca7147953428158484ab4f5c0480ad220688fbfce

  • SHA512

    92d0683cc73ea1479426a5869cc66be21b28482069af8c8fceb69ea183d978d5f600323011c7944a1b618b11e3a56d4371aaf8dcc3238098c4388eccd5115b51

  • SSDEEP

    12288:P2yRPHfLlUN7Fl1dYySBrNoZZDetBHGTRNj:97wAySdNorDgBHGTRNj

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

185.157.160.229:60006

neoncorex.duckdns.org:60006

Mutex

1d5c6a3e-60c1-4684-aee7-fbdc0338bfa0

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    neoncorex.duckdns.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2021-07-29T18:43:26.772131836Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    true

  • connect_delay

    4000

  • connection_port

    60006

  • default_group

    NANOSHIELD

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    1d5c6a3e-60c1-4684-aee7-fbdc0338bfa0

  • mutex_timeout

    5000

  • prevent_system_sleep

    true

  • primary_connection_host

    185.157.160.229

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      JaffaCakes118_6102daa4935e016dea8dc3eec27d2ac1

    • Size

      479KB

    • MD5

      6102daa4935e016dea8dc3eec27d2ac1

    • SHA1

      c5320bd4d54b856aa90bc7a92ca9ce5dc22e70ca

    • SHA256

      5d192cc1e5d9569479192b9ca7147953428158484ab4f5c0480ad220688fbfce

    • SHA512

      92d0683cc73ea1479426a5869cc66be21b28482069af8c8fceb69ea183d978d5f600323011c7944a1b618b11e3a56d4371aaf8dcc3238098c4388eccd5115b51

    • SSDEEP

      12288:P2yRPHfLlUN7Fl1dYySBrNoZZDetBHGTRNj:97wAySdNorDgBHGTRNj

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks