General

  • Target

    945bf76fc6fa7ec4590c1eb31d91626cd303e375aed453406585a8e976196d76N.exe

  • Size

    281KB

  • Sample

    250323-affdgstxez

  • MD5

    e996f39dc7aaedb7708907aa52dd8fd0

  • SHA1

    df690b3f42a2a9d2934730976bcb267994e99948

  • SHA256

    945bf76fc6fa7ec4590c1eb31d91626cd303e375aed453406585a8e976196d76

  • SHA512

    d3cf6bf102fbb47e79d104f6c73696a73b625e8c1680573cd22d9cd206795eae7d10c02ff1c7c09387264094bd51aa7501819f8ab181db4217b3218e8636ebfe

  • SSDEEP

    6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f8:boSeGUA5YZazpXUmZhZ6U

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

sysupdate24.ddns.net:45400

Mutex

ae82ab7f-db07-49ee-9d2b-76075d76f37f

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

  • buffer_size

    65535

  • build_time

    2020-04-24T17:41:53.492468936Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    45400

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    ae82ab7f-db07-49ee-9d2b-76075d76f37f

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    sysupdate24.ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      945bf76fc6fa7ec4590c1eb31d91626cd303e375aed453406585a8e976196d76N.exe

    • Size

      281KB

    • MD5

      e996f39dc7aaedb7708907aa52dd8fd0

    • SHA1

      df690b3f42a2a9d2934730976bcb267994e99948

    • SHA256

      945bf76fc6fa7ec4590c1eb31d91626cd303e375aed453406585a8e976196d76

    • SHA512

      d3cf6bf102fbb47e79d104f6c73696a73b625e8c1680573cd22d9cd206795eae7d10c02ff1c7c09387264094bd51aa7501819f8ab181db4217b3218e8636ebfe

    • SSDEEP

      6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f8:boSeGUA5YZazpXUmZhZ6U

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.