General
-
Target
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04.exe
-
Size
2.5MB
-
Sample
240312-dv4amseh9y
-
MD5
411c2e3611e8ee701918cfe17399da79
-
SHA1
a01d2ceb1b9d0e002eb67a00fbac9238285dce85
-
SHA256
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04
-
SHA512
c68a62e0342cdaaa23a8ad385551dff3d7f60e34c28c63797ef8d5969e714df6b0f7fa66a8904aaf65c034c26860f21453434e8678a48d149b2137054ee57b50
-
SSDEEP
49152:YBO8QRm2I9bC9hY8PU5sevK7F6wd0HL5xRpMrpaKE9eFodKe/HT0:Y88QRmVluhnPyhyx30HlUpaKpodtHT0
Static task
static1
Behavioral task
behavioral1
Sample
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
remcos
RemoteHost
gamemodz.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
sysupdate.exe
-
copy_folder
sysupdate
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FEY33U
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
xworm
3.1
gamemodz.duckdns.org:7000
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04.exe
-
Size
2.5MB
-
MD5
411c2e3611e8ee701918cfe17399da79
-
SHA1
a01d2ceb1b9d0e002eb67a00fbac9238285dce85
-
SHA256
f0ebd23eac064a10da288dbf3b9db45bdf5e107c970e57f7974710cad01aed04
-
SHA512
c68a62e0342cdaaa23a8ad385551dff3d7f60e34c28c63797ef8d5969e714df6b0f7fa66a8904aaf65c034c26860f21453434e8678a48d149b2137054ee57b50
-
SSDEEP
49152:YBO8QRm2I9bC9hY8PU5sevK7F6wd0HL5xRpMrpaKE9eFodKe/HT0:Y88QRmVluhnPyhyx30HlUpaKpodtHT0
-
Chaos Ransomware
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects command variations typically used by ransomware
-
Renames multiple (202) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-