General
-
Target
TESPO.exe
-
Size
56.0MB
-
Sample
230309-w84gnshf73
-
MD5
4733810f2e9c33071bbb7faf9ca3fe52
-
SHA1
8c79d547cd808915bba437b852de1f783ae573eb
-
SHA256
4680f63f12e9cc7e508287cd922b95b94da6a87da99897a42193436d6f6d2727
-
SHA512
93a016bbeb8ec7cc1b31ae63747a7b1d1cf38a77e49e96ab47874ee9e6a5fbddad05088a7e8a8f27b0501544c3949898f3e92b435dc2985b1797f05fc83676a8
-
SSDEEP
12288:zc5iHVRdOwgMUvHbuc4FUlCJuJAoKP+u5BvVw/CctMTiIGi:w5URU5MUvHbLhlCJn5P55wakMlG
Static task
static1
Behavioral task
behavioral1
Sample
TESPO.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TESPO.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
remcos
GRADE
79.110.63.178:8974
plunder.nsupdate.info:8974
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
hghade-542B08
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
TESPO.exe
-
Size
56.0MB
-
MD5
4733810f2e9c33071bbb7faf9ca3fe52
-
SHA1
8c79d547cd808915bba437b852de1f783ae573eb
-
SHA256
4680f63f12e9cc7e508287cd922b95b94da6a87da99897a42193436d6f6d2727
-
SHA512
93a016bbeb8ec7cc1b31ae63747a7b1d1cf38a77e49e96ab47874ee9e6a5fbddad05088a7e8a8f27b0501544c3949898f3e92b435dc2985b1797f05fc83676a8
-
SSDEEP
12288:zc5iHVRdOwgMUvHbuc4FUlCJuJAoKP+u5BvVw/CctMTiIGi:w5URU5MUvHbLhlCJn5P55wakMlG
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-