General

  • Target

    4e1e0180c5e140946d7970f64e644ac1.bin

  • Size

    1.2MB

  • Sample

    240405-bl2pcafh9v

  • MD5

    2f27e94323f074a19ebd3e84dbda3c32

  • SHA1

    f02bc8576543753744908deffdc1c6a9bf43d5f4

  • SHA256

    8ecb5ec6111bd420e911c8aedcdb8381a90512d8e8845089a60f9ea2a3647660

  • SHA512

    5450552dad35835e172b5fca5645a3483852d36a45f9d753abb294eb9b0f54df7807cf89e5a0565ff34ac25660f20adc9c38f02c29b3e141aa31469b890e21bc

  • SSDEEP

    24576:IQ6KPFRm+qEppAOGzK37+qXMqZ8KvTMn9AFGoaKaw1WQwk3PjgST73Nt:7qvEp2Qr1NZ8Kvg9cGoanaW5krgOht

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:44999

127.0.0.1:54991

africarem.duckdns.org:54991

africarem.duckdns.org:44999

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-R571U4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      a108ae8bd69ac84bc8dd5fa7bdbb6eff9cd65a70c16567e0f36dae1f15d090fd.exe

    • Size

      1.6MB

    • MD5

      4e1e0180c5e140946d7970f64e644ac1

    • SHA1

      e5f939a05d817a4b56ef7ec74788ad9ce3b8cb27

    • SHA256

      a108ae8bd69ac84bc8dd5fa7bdbb6eff9cd65a70c16567e0f36dae1f15d090fd

    • SHA512

      f50883d44f5ccdccb9adf9cb6cc3f6c9d6947e9b0f85d7727af151424e54d1f041d3bb6238dd29f27c47ebed20ae7e74187d31b67fd285cc1aa7d28e66204954

    • SSDEEP

      49152:ay6imwGhfj4GBT2z95Zw/L+gwnz1nwyuPTh:azimw4f8iSuD+g

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • ModiLoader Second Stage

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks