General

  • Target

    JaffaCakes118_3a9720029c0f5bb91544409a999c9d09

  • Size

    392KB

  • Sample

    250106-zzct5szmcq

  • MD5

    3a9720029c0f5bb91544409a999c9d09

  • SHA1

    0c2e6bcd2117b30496df63bc36c7955a6bfc6635

  • SHA256

    9e1751025908631420ddd8257775bedc2d57becd923a73e488e6b45a7fa69e05

  • SHA512

    8d0af9fa03271b7e2e0c07ad448bebc49351791de44f4d7d3d151bb796f186f190b9823d865dd7c5947e60e2007efc3990b5e4dd965f6bbbe1048a53e8241674

  • SSDEEP

    6144:31+Q6D6DuaHqL6K5bTQpgwjCv9EekXJjfnrCevDYUauHFptA8uDYMrmT8:3/6OaamerCmfZfnme74uHF3A8uDd

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

146.255.79.172:6789

omada12.mooo.com:6789

Mutex

f73fa5dc-696f-4685-a6af-b9bb78345ab2

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    omada12.mooo.com

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2018-02-16T23:00:42.179393136Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    true

  • connect_delay

    4000

  • connection_port

    6789

  • default_group

    ANGL

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    f73fa5dc-696f-4685-a6af-b9bb78345ab2

  • mutex_timeout

    5000

  • prevent_system_sleep

    true

  • primary_connection_host

    146.255.79.172

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      JaffaCakes118_3a9720029c0f5bb91544409a999c9d09

    • Size

      392KB

    • MD5

      3a9720029c0f5bb91544409a999c9d09

    • SHA1

      0c2e6bcd2117b30496df63bc36c7955a6bfc6635

    • SHA256

      9e1751025908631420ddd8257775bedc2d57becd923a73e488e6b45a7fa69e05

    • SHA512

      8d0af9fa03271b7e2e0c07ad448bebc49351791de44f4d7d3d151bb796f186f190b9823d865dd7c5947e60e2007efc3990b5e4dd965f6bbbe1048a53e8241674

    • SSDEEP

      6144:31+Q6D6DuaHqL6K5bTQpgwjCv9EekXJjfnrCevDYUauHFptA8uDYMrmT8:3/6OaamerCmfZfnme74uHF3A8uDd

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks