General
-
Target
Invoice #00198683.img
-
Size
1.2MB
-
Sample
230502-m78wbsag42
-
MD5
8a4126ea1c619d70c6e88b85e438a044
-
SHA1
d322fdfdf32967cb0d1e2b783ccafd194505e6f1
-
SHA256
0da2a14893f3a71e625a619c4d4fc85a67f506ec1024e394a70db5a037d7d673
-
SHA512
a498bb9837e7fcda0f68621677bc5c718c131b65ded90c27b928ac559c14f2ee943e74eac5d467c8605c310b4d9581ba11acd453f91abc024a993e9311509ae3
-
SSDEEP
12288:W5l9W77bOltPah+3EwFE430HVWuAAT6JlK0:WHcOAI3OT6F
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE_.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INVOICE_.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
remcos
Jan2023
retsuportm.ddnsfree.com:2404
spreadrem1.ddnsfree.com:2404
spreadbum2.ddnsfree.com:2404
spreadbum1.ddnsfree.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
jkjhuy
-
mouse_option
false
-
mutex
winwin-WEWL7V
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
INVOICE_.EXE
-
Size
706KB
-
MD5
34c94b6a7d4d77779694cb275e6b1a12
-
SHA1
f0ebf187c555a97c35c15821b8221cc5db53154c
-
SHA256
4d4408cffd1fb327607afaec82eb9e799e5f147de31d768535d910ac513afa4b
-
SHA512
1436fc531474050a7edcc2420724656df5b99244c495651bb081c5247ae72de0b7efd970b02965d35402009204bebc1a2c43058e6024cf09a55033d515109bf5
-
SSDEEP
12288:M5l9W77bOltPah+3EwFE430HVWuAAT6JlK0:MHcOAI3OT6F
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-