General

  • Target

    TKM Teknolojik Request order Document Specs 94859675.exe

  • Size

    883KB

  • Sample

    230213-r51t6adc8s

  • MD5

    77321c3b7913f9ea3d70c8901e6e7acc

  • SHA1

    3d360ee32dc1ec1d9f050aa6dcc7722c837f7e94

  • SHA256

    31a20253af2b351eac7922198159d9b73a032649e942da764bc6811e7b95ab34

  • SHA512

    521a380f7f28f1e398426e92989fc6c7c1bb0ac9b55b1f5ea1d279cdafbc9c21e1bdb0cff8ae676993c46acb255e6f3b238e3c4e511130c3b37e4f8f63a179bd

  • SSDEEP

    12288:fb8A+lyMML0gN55kXFyqf0bGBvGoE05qhAf1nAhglR:f4ZzML0gN5WXFaK9GoEUf1nAhglR

Malware Config

Extracted

Family

remcos

Botnet

UP

C2

79.110.63.178:8974

plunder.nsupdate.info:8974

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    vsr

  • mouse_option

    false

  • mutex

    Roup-JE7MFN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      TKM Teknolojik Request order Document Specs 94859675.exe

    • Size

      883KB

    • MD5

      77321c3b7913f9ea3d70c8901e6e7acc

    • SHA1

      3d360ee32dc1ec1d9f050aa6dcc7722c837f7e94

    • SHA256

      31a20253af2b351eac7922198159d9b73a032649e942da764bc6811e7b95ab34

    • SHA512

      521a380f7f28f1e398426e92989fc6c7c1bb0ac9b55b1f5ea1d279cdafbc9c21e1bdb0cff8ae676993c46acb255e6f3b238e3c4e511130c3b37e4f8f63a179bd

    • SSDEEP

      12288:fb8A+lyMML0gN55kXFyqf0bGBvGoE05qhAf1nAhglR:f4ZzML0gN5WXFaK9GoEUf1nAhglR

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks