General

  • Target

    PO4102672345.doc

  • Size

    345KB

  • Sample

    230920-jat45agg83

  • MD5

    987971ef05bbf3bee0e5f0548cb53b64

  • SHA1

    8b961e75ab5fd688da06b1ade6ea1d2ed82fc3df

  • SHA256

    bbe10b8d55fd248651e7d483e82426fda7c4e2799461065d734858362e4bada8

  • SHA512

    e5eb25a662b986098e6657b0edf2bdcf7f3ebb75b03121ec92707332466178cf44570d55bd6e8b506e88ff9bef282efc75d6dd747fdfd387846dfdc59822bccb

  • SSDEEP

    768:jbOnDlKzboVm33/y3NZZ2sO3pv6o+qq60Vf7:jbsDUzbgmENZZ2sOx6o9q7Vf7

Malware Config

Extracted

Family

remcos

Botnet

ARAB

C2

tornado.ydns.eu:1972

orifak.ydns.eu:1972

wedhstinwell.online:1972

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    RmgDEfdfdef-8B9XCY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      PO4102672345.doc

    • Size

      345KB

    • MD5

      987971ef05bbf3bee0e5f0548cb53b64

    • SHA1

      8b961e75ab5fd688da06b1ade6ea1d2ed82fc3df

    • SHA256

      bbe10b8d55fd248651e7d483e82426fda7c4e2799461065d734858362e4bada8

    • SHA512

      e5eb25a662b986098e6657b0edf2bdcf7f3ebb75b03121ec92707332466178cf44570d55bd6e8b506e88ff9bef282efc75d6dd747fdfd387846dfdc59822bccb

    • SSDEEP

      768:jbOnDlKzboVm33/y3NZZ2sO3pv6o+qq60Vf7:jbsDUzbgmENZZ2sOx6o9q7Vf7

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ModiLoader Second Stage

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks