General

  • Target

    2025-04-05_5a42731e84f6264b40a9fc8d5f527a0e_black-basta_luca-stealer_metamorfo

  • Size

    1.3MB

  • Sample

    250405-a3vfxszk13

  • MD5

    5a42731e84f6264b40a9fc8d5f527a0e

  • SHA1

    c9cd62e51d2ed4feb92582b88a9f9b25b890c3ca

  • SHA256

    da277087425deecdf94e54b44bdf2df5042d4a65cc97b2b958876d528b2b850e

  • SHA512

    77972bd5a3c99922dd6aa25cebb0d5252280228864a3d8763bb40c67257f5d6bdfc31d67c697c28b528b9a7eeaab5aad8f99c481ab288aa99f9949d839daa230

  • SSDEEP

    24576:6NA3R5drXvd+CPORdlivNuFrNT2P9Z0+4sHVu1h6LId7nT1RMwaMm3CfBomuaSh:z5FdcD2P9Zzrc1h6LIdzTXM76fBo3aK

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

marinjack44.ddns.net:63480

127.0.0.1:63480

Mutex

d9905d9b-af01-48cd-858a-13e2bac55a68

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2019-05-25T01:16:24.038793536Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    true

  • connect_delay

    4000

  • connection_port

    63480

  • default_group

    BOSS

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    d9905d9b-af01-48cd-858a-13e2bac55a68

  • mutex_timeout

    5000

  • prevent_system_sleep

    true

  • primary_connection_host

    marinjack44.ddns.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      2025-04-05_5a42731e84f6264b40a9fc8d5f527a0e_black-basta_luca-stealer_metamorfo

    • Size

      1.3MB

    • MD5

      5a42731e84f6264b40a9fc8d5f527a0e

    • SHA1

      c9cd62e51d2ed4feb92582b88a9f9b25b890c3ca

    • SHA256

      da277087425deecdf94e54b44bdf2df5042d4a65cc97b2b958876d528b2b850e

    • SHA512

      77972bd5a3c99922dd6aa25cebb0d5252280228864a3d8763bb40c67257f5d6bdfc31d67c697c28b528b9a7eeaab5aad8f99c481ab288aa99f9949d839daa230

    • SSDEEP

      24576:6NA3R5drXvd+CPORdlivNuFrNT2P9Z0+4sHVu1h6LId7nT1RMwaMm3CfBomuaSh:z5FdcD2P9Zzrc1h6LIdzTXM76fBo3aK

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.