General
-
Target
TT Air Export COSCO.exe
-
Size
1.1MB
-
Sample
230214-qd5tcsch5w
-
MD5
23ce4c2eb85eea9a1871bf922978ade9
-
SHA1
8cfa86cdbcda76c59cea93839115f84b9b47ced0
-
SHA256
5ca676b334d8a3f4542877a696a7092b29dbdeddabcd70af2a80e5c8384a75b6
-
SHA512
de2475abf3ed3101f9b3d6c7fa37da02ee99f7a37fd239f2a6e87b7d67837d1a5f3c09d05750150e08a18a881322c8b719e8d03efd43885c991774707817172c
-
SSDEEP
12288:oX8lOqFSsZ40z3QjB2lr5fPx7Zh70WoQzV9hBoSFhAf1nAhglR:Q8ltFSQ3AB2zp7pcf1nAhglR
Static task
static1
Behavioral task
behavioral1
Sample
TT Air Export COSCO.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
TT Air Export COSCO.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
remcos
13-Feb-2023
193.23.3.34:43672
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
goog.dat
-
keylog_flag
false
-
keylog_folder
Google
-
mouse_option
false
-
mutex
-201DO7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
TT Air Export COSCO.exe
-
Size
1.1MB
-
MD5
23ce4c2eb85eea9a1871bf922978ade9
-
SHA1
8cfa86cdbcda76c59cea93839115f84b9b47ced0
-
SHA256
5ca676b334d8a3f4542877a696a7092b29dbdeddabcd70af2a80e5c8384a75b6
-
SHA512
de2475abf3ed3101f9b3d6c7fa37da02ee99f7a37fd239f2a6e87b7d67837d1a5f3c09d05750150e08a18a881322c8b719e8d03efd43885c991774707817172c
-
SSDEEP
12288:oX8lOqFSsZ40z3QjB2lr5fPx7Zh70WoQzV9hBoSFhAf1nAhglR:Q8ltFSQ3AB2zp7pcf1nAhglR
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-