General
-
Target
AWB774933084407_994348862659707_PDF.exe
-
Size
2.2MB
-
Sample
231127-larp4sfe7y
-
MD5
9fba17c37d37585a3e5f87924371fc1e
-
SHA1
705e634e3c6e92957276444c453f6aa573bb78d0
-
SHA256
f65252925f0545a157e29ecc1115fb8ba1b55c5e777fcf8ef6a52cfdd5b0fb25
-
SHA512
397df116bfad71269b4ebc63d04a00bbe1d2e59b8feac9b008416f8d92735274c6b7e7059d8052c3a0276b7dd12b2ecd9c83aa98dae4ac40b7ce3f00629442a7
-
SSDEEP
49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41FFehg1mQmPoE:JCpcyV/wjpdZrxEVEtI141qnLPoE
Static task
static1
Behavioral task
behavioral1
Sample
AWB774933084407_994348862659707_PDF.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
AWB774933084407_994348862659707_PDF.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
remcos
Crypted
172.174.245.21:5400
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
noer.dat
-
keylog_flag
false
-
keylog_path
%UserProfile%
-
mouse_option
false
-
mutex
rousasi-RW3F58
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
AWB774933084407_994348862659707_PDF.exe
-
Size
2.2MB
-
MD5
9fba17c37d37585a3e5f87924371fc1e
-
SHA1
705e634e3c6e92957276444c453f6aa573bb78d0
-
SHA256
f65252925f0545a157e29ecc1115fb8ba1b55c5e777fcf8ef6a52cfdd5b0fb25
-
SHA512
397df116bfad71269b4ebc63d04a00bbe1d2e59b8feac9b008416f8d92735274c6b7e7059d8052c3a0276b7dd12b2ecd9c83aa98dae4ac40b7ce3f00629442a7
-
SSDEEP
49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41FFehg1mQmPoE:JCpcyV/wjpdZrxEVEtI141qnLPoE
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-