General
-
Target
tmp
-
Size
2.3MB
-
Sample
231129-pwm6laga95
-
MD5
f27149642f210c6682b580c09c427871
-
SHA1
ef5bd96f33496b8843eecbbe474ffe55a4fc8b95
-
SHA256
36d8435b15b027b6fce23ff563cbba9661fb04f8c3a2404b10e7e2c37700dd19
-
SHA512
e715b95a3f33a42f184f63c9f3f225d207c03912a2ab4c99e6228e17c00ab5aced10b55f859ee7acbe23f78cbe315df4014f8595890e2b9dba622a968375077d
-
SSDEEP
49152:UkQzWGa8pH8yc0/wU2lpe63ZrxKrVEbRIqiPt41FFehg1mQ5C:UNqGa8pcyV/wjpdZrxEVEtI141qn
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
remcos
Crypted
172.174.245.21:5400
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
ouor.dat
-
keylog_flag
false
-
keylog_path
%UserProfile%
-
mouse_option
false
-
mutex
lilloere-UIQGT9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
tmp
-
Size
2.3MB
-
MD5
f27149642f210c6682b580c09c427871
-
SHA1
ef5bd96f33496b8843eecbbe474ffe55a4fc8b95
-
SHA256
36d8435b15b027b6fce23ff563cbba9661fb04f8c3a2404b10e7e2c37700dd19
-
SHA512
e715b95a3f33a42f184f63c9f3f225d207c03912a2ab4c99e6228e17c00ab5aced10b55f859ee7acbe23f78cbe315df4014f8595890e2b9dba622a968375077d
-
SSDEEP
49152:UkQzWGa8pH8yc0/wU2lpe63ZrxKrVEbRIqiPt41FFehg1mQ5C:UNqGa8pcyV/wjpdZrxEVEtI141qn
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-