General
-
Target
TKM Teknolojik Request order Document Specs 94859675.exe
-
Size
883KB
-
Sample
230213-r51t6adc8s
-
MD5
77321c3b7913f9ea3d70c8901e6e7acc
-
SHA1
3d360ee32dc1ec1d9f050aa6dcc7722c837f7e94
-
SHA256
31a20253af2b351eac7922198159d9b73a032649e942da764bc6811e7b95ab34
-
SHA512
521a380f7f28f1e398426e92989fc6c7c1bb0ac9b55b1f5ea1d279cdafbc9c21e1bdb0cff8ae676993c46acb255e6f3b238e3c4e511130c3b37e4f8f63a179bd
-
SSDEEP
12288:fb8A+lyMML0gN55kXFyqf0bGBvGoE05qhAf1nAhglR:f4ZzML0gN5WXFaK9GoEUf1nAhglR
Static task
static1
Behavioral task
behavioral1
Sample
TKM Teknolojik Request order Document Specs 94859675.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TKM Teknolojik Request order Document Specs 94859675.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
remcos
UP
79.110.63.178:8974
plunder.nsupdate.info:8974
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
vsr
-
mouse_option
false
-
mutex
Roup-JE7MFN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
TKM Teknolojik Request order Document Specs 94859675.exe
-
Size
883KB
-
MD5
77321c3b7913f9ea3d70c8901e6e7acc
-
SHA1
3d360ee32dc1ec1d9f050aa6dcc7722c837f7e94
-
SHA256
31a20253af2b351eac7922198159d9b73a032649e942da764bc6811e7b95ab34
-
SHA512
521a380f7f28f1e398426e92989fc6c7c1bb0ac9b55b1f5ea1d279cdafbc9c21e1bdb0cff8ae676993c46acb255e6f3b238e3c4e511130c3b37e4f8f63a179bd
-
SSDEEP
12288:fb8A+lyMML0gN55kXFyqf0bGBvGoE05qhAf1nAhglR:f4ZzML0gN5WXFaK9GoEUf1nAhglR
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-