General
-
Target
00d0dcc155b889107ad32e90f8172490dc32280cc62e762bfa5e7deecea1099d
-
Size
1.3MB
-
Sample
220130-jdyayshfa8
-
MD5
e04d958c16df00046fe516e6ea187321
-
SHA1
c142d74d6d585550af9d810f73faa8418d6045a5
-
SHA256
00d0dcc155b889107ad32e90f8172490dc32280cc62e762bfa5e7deecea1099d
-
SHA512
8b3dc13e2afe63d6129849adb6b36e55a847210056cba2153988b4c4c036a2e14c00b1d50af1c34a0762e9862461f9fa8f1f796d05064eca97b1a1e939962942
Static task
static1
Behavioral task
behavioral1
Sample
BKLULYOT.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
BKLULYOT.exe
Resource
win10-en-20211208
Malware Config
Extracted
remcos
3.3.0 Pro
TLS
latua.nsupdate.info:7722
goldie.nsupdate.info:7722
coke.nsupdate.info:7722
fanta.nsupdate.info:7722
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
myhdudhdmmderfff-0RK6ZO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Targets
-
-
Target
BKLULYOT.EXE
-
Size
755KB
-
MD5
2cb79bcce5050528580bf880f47d9d61
-
SHA1
32e93d278b70caf5156e8bb1d7bfc8e29658fccc
-
SHA256
a00a856f0d85fcb7f485777ae81a0b1c52974bb1cd2482ba5e987a7ce8207511
-
SHA512
a32393ece3ac9e4ff24ae1d50bf81657c4d83772b96bcdcb9c9d6590e0570f2f2c3ebd15ff21cf76be482f292b80138b301159a3bc0d3a4c50e7e215cf0c5b94
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage
-
Adds Run key to start application
-