General
-
Target
paymentslip3023.exe
-
Size
1.9MB
-
Sample
231130-lg2hwsac7s
-
MD5
6109410cc52c8810d9c1175f54a058e4
-
SHA1
c4ac41c6b88baee959e9a8752679a426b8dfa547
-
SHA256
947365df7a1ad94cfa2029db2c88985f3d34df5b9076e5392eeda08c6f7ba673
-
SHA512
7a8d49155f42e8b8b78d48ac31fae1e42b1fe31609074b316c96539ea820d5bced611e3f7f314c115242abfd70cdad61d2ad73a568e3b7d2cf1e1cec91621f8d
-
SSDEEP
49152:Ad8fIwCjykkGo5ITnLK+Ey9S1qXtfRGHKpk3H8eiTwHFimH9jIrMKSIa+GGXHIf+:AdoIwkkrITnG69S1qXtfRGHKpk3H8eiD
Static task
static1
Behavioral task
behavioral1
Sample
paymentslip3023.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
paymentslip3023.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
remcos
xxxx
mxzaa.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
xxxx
-
mouse_option
false
-
mutex
Rmc-4YTD1T
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
paymentslip3023.exe
-
Size
1.9MB
-
MD5
6109410cc52c8810d9c1175f54a058e4
-
SHA1
c4ac41c6b88baee959e9a8752679a426b8dfa547
-
SHA256
947365df7a1ad94cfa2029db2c88985f3d34df5b9076e5392eeda08c6f7ba673
-
SHA512
7a8d49155f42e8b8b78d48ac31fae1e42b1fe31609074b316c96539ea820d5bced611e3f7f314c115242abfd70cdad61d2ad73a568e3b7d2cf1e1cec91621f8d
-
SSDEEP
49152:Ad8fIwCjykkGo5ITnLK+Ey9S1qXtfRGHKpk3H8eiTwHFimH9jIrMKSIa+GGXHIf+:AdoIwkkrITnG69S1qXtfRGHKpk3H8eiD
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-