General

  • Target

    56fd66befd085f91053c4b3f9b8e9ab6.bin

  • Size

    331KB

  • Sample

    230301-bph2eade81

  • MD5

    6c0d638f4b444ae483b8ed20dbf37a8b

  • SHA1

    bdf213f34a7eb71197966c93a2c78e870435d7a6

  • SHA256

    18fdcc346ae002c4777d2543c16d2f9dd1d500d04acf07af94148e895eb57f48

  • SHA512

    af29349f19b485190a969fb6c4c8d974a2a713dca09a6974271589d93e97f02c1fb5f75f690b4f1547c9c4a6734ba964ea3526f5d46a3f58344603bb4fa9b90f

  • SSDEEP

    6144:3NAAmPZP2qCqupNv4Risd4amYRpIFCLnaQpZDlECCR10zqt0rHxRCbfd+sG3RzBF:dAAmPB2qCq64RisdK2G8zaQRafBGRRic

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

thereal2333.hopto.org:2404

serverr00008.hopto.org:2404

subsubrm.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmco-Z6AR55

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      42ba74ceecf062e25955c7f807f584c4137310f39f3864e78942e16cfb87a864.exe

    • Size

      771KB

    • MD5

      56fd66befd085f91053c4b3f9b8e9ab6

    • SHA1

      3516e35ca2fcaf3f8c8541d495b597e5b5799d50

    • SHA256

      42ba74ceecf062e25955c7f807f584c4137310f39f3864e78942e16cfb87a864

    • SHA512

      9e8c9723424622eccf5c82366a1455d808d45baddfe2ee7ba75c93fc96230b56d37ceafdd2e67f9179db135549eab0db9321754328496b305e6ff50785c300c4

    • SSDEEP

      12288:Pr5Nxzs78p/cJCzQkgtr80XGjObPkOOlIiteSmF0Z/:PFvzs7bJWbgtopibPkOOxm0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks