General
-
Target
42ac8e7e9df9877af1382f5626fd74e63210d307f6d577cd5b387ffd0c9520bd.exe
-
Size
1.6MB
-
Sample
240425-brmglscg65
-
MD5
2cc30d206669699e58870623365fef82
-
SHA1
de5e70f094d0b72660aa57b87667edd9d52971fc
-
SHA256
42ac8e7e9df9877af1382f5626fd74e63210d307f6d577cd5b387ffd0c9520bd
-
SHA512
2f1f275b9a928844d8f97dc07aa4d0f53da61fd06a507424a873ba128e71d2754e710dbebe1935adc3dada94b42417b1fc30a1915a40b2cffc655c55d7c62005
-
SSDEEP
24576:7MkT4gLKu9KKozJQd/HJNRO/BhM6wIJp4m+3bu8U2flxAv:QkTpT9K1mzyhM6wW4mEQ2W
Static task
static1
Behavioral task
behavioral1
Sample
42ac8e7e9df9877af1382f5626fd74e63210d307f6d577cd5b387ffd0c9520bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42ac8e7e9df9877af1382f5626fd74e63210d307f6d577cd5b387ffd0c9520bd.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
remcos
RemoteHost
kenoss.duckdns.org:1166
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
fggrt
-
mouse_option
false
-
mutex
Rmc-L24XL1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
42ac8e7e9df9877af1382f5626fd74e63210d307f6d577cd5b387ffd0c9520bd.exe
-
Size
1.6MB
-
MD5
2cc30d206669699e58870623365fef82
-
SHA1
de5e70f094d0b72660aa57b87667edd9d52971fc
-
SHA256
42ac8e7e9df9877af1382f5626fd74e63210d307f6d577cd5b387ffd0c9520bd
-
SHA512
2f1f275b9a928844d8f97dc07aa4d0f53da61fd06a507424a873ba128e71d2754e710dbebe1935adc3dada94b42417b1fc30a1915a40b2cffc655c55d7c62005
-
SSDEEP
24576:7MkT4gLKu9KKozJQd/HJNRO/BhM6wIJp4m+3bu8U2flxAv:QkTpT9K1mzyhM6wW4mEQ2W
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-