General
-
Target
acf572bb612048e33436a2a161c5c4db.bin
-
Size
656KB
-
Sample
231024-cjxs2sbg33
-
MD5
5b4672a5471a3b8599c81d4e12ad9734
-
SHA1
6dedfbca1f442086eb9cab59d68462adab50c8d6
-
SHA256
f8928be5254025f624a79c543622eeff520d4c7bcb5f404a1c0cc7d30c51b52c
-
SHA512
a2b8d3faeee16f678057f8139cc4b23bf425cf0d56b37465ce137fc7b197875d5f345460b8143ab512064696f6c6bf6ca4b8f8a8b25380d13d1d9eaed4690e7e
-
SSDEEP
12288:rLdxgz4j+K90Oe5Z3q8GcUU4TTqzOWVPYLY8SZAnKMW9p9tc2DSQum4axN:rLdx9yXh3BUmzvVgEBTMapLVd1N
Static task
static1
Behavioral task
behavioral1
Sample
267f54dc36591c1746dba949c776e015c9c89be7a11f4c3ebf7ab0fb4510e0e3.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
267f54dc36591c1746dba949c776e015c9c89be7a11f4c3ebf7ab0fb4510e0e3.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
remcos
MIRACLE DAYS (FAITH)
pentester0.accesscam.org:56796
pentester02.duckdns.org:2256
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
onedrive.exe
-
copy_folder
onedrive
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
ONE-A9HB5W
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
267f54dc36591c1746dba949c776e015c9c89be7a11f4c3ebf7ab0fb4510e0e3.exe
-
Size
1.2MB
-
MD5
acf572bb612048e33436a2a161c5c4db
-
SHA1
644940b6bd85080dc68e779c9d8a8b521caea6e8
-
SHA256
267f54dc36591c1746dba949c776e015c9c89be7a11f4c3ebf7ab0fb4510e0e3
-
SHA512
7306d0700fe90b90d42e21ce78e22636e2b1b41eecb24f8613866319ac10770ca335d9797b8d912e8cce2457e705018160f37ea5212cf3d938a8ec626f126a75
-
SSDEEP
24576:qeA4Puy3YeOyFbcA3l0xdapY2bwplPYlRQZlo/:q5cZ3BmdaG261E/
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-