General
-
Target
7822356135.zip
-
Size
476KB
-
Sample
220802-v2m1nsaecp
-
MD5
81e569cab4b371e49ebef007dbdc3aba
-
SHA1
e67351431f7862c3601eeec8688c54dc517b039e
-
SHA256
2b1ee0cf7636ddf5dfa510aa01088f8f61831e88a1c3257eca48f4100b3fbc00
-
SHA512
c9123d6d85ec50f1056f2945bca1d21c54d56d6ee9a7a23e25292c34808c47337ef9f045284a781690963aff7bb76e49bf7d09bc0074ff9f9d00433d019889b8
Static task
static1
Behavioral task
behavioral1
Sample
5fccdbafe8bfe19bb457f3066b5262a24fd637adc128b4254c4b9eec4226832c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5fccdbafe8bfe19bb457f3066b5262a24fd637adc128b4254c4b9eec4226832c.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
remcos
RemoteHost
dash.3utilities.com:2404
dash1.3utilities.com:2404
dash2.ddns.net:2404
bash.mywire.org:2404
bash1.accesscam.org:2404
dash3.ddns.net:2404
dash4.ddns.net:2404
bash2.accessscam.org:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
dashboard-08X8SV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Targets
-
-
Target
5fccdbafe8bfe19bb457f3066b5262a24fd637adc128b4254c4b9eec4226832c
-
Size
836KB
-
MD5
a424db47ced8dddd3f6a9ac6c6f04803
-
SHA1
5fce281b9435345ec39659294e3dc5318cc2df17
-
SHA256
5fccdbafe8bfe19bb457f3066b5262a24fd637adc128b4254c4b9eec4226832c
-
SHA512
bd4f3d15ee91e063220e21b41b735e80a7c9e3b4d5da852e65357ed2a8e2423681446a8df75c78e168e4dc24f33294794a959310e8301f7edf50599ba6e57d92
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-