Behavioral task
behavioral1
Sample
ggsploit V1.2.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ggsploit V1.2.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
unins000.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
unins000.exe
Resource
win10v2004-20240802-en
General
-
Target
ggsploit.zip
-
Size
309KB
-
MD5
37370dccbd95f63e49593a17cb3929aa
-
SHA1
1a4d8f94634753440fb570eb20e259f57cbb7308
-
SHA256
7579c4ce51e780841d1a2dd2c83e3dde93441a84a488316dbd19d1e3a0cf03c4
-
SHA512
6e7b231237a70f6c57e4135b2be32432c83ac74b1de5de77c2b85f806c0060889a99b9cda8cd32c374a02a092ea77af143feed21614644eea8548c4ac817f01c
-
SSDEEP
6144:gIw5OkChoEFViKBpHL2tJMDBvOSuC+ULfkZ4bbrOK2sVW5KquT2ofj:gXs4GprSGVuChL8c/OK2sVW5vU
Malware Config
Extracted
discordrat
-
discord_token
MTI5MDc3NzUxNTM1NDIyNjY5OQ.GRewL1.rZmEWtyFw1xziPUaWh2BVUvRwh05H7FaxQvvbM
-
server_id
1290772191046139915
Extracted
remcos
5.1.3 Light
ggsploit V1.2.2
127.0.0.1:4444
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IY8ZNV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Discordrat family
-
Remcos family
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/ggsploit V1.2.4.exe unpack001/unins000.exe
Files
-
ggsploit.zip.zip
-
ggsploit V1.2.4.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
logo.jpeg.jpg
-
logo2.png.png
-
unins000.exe.exe windows:5 windows x86 arch:x86
f635308d4c84ff7b67cc226030cba013
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
HeapAlloc
GetProcAddress
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetCurrentProcess
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetCurrentProcessId
GetTickCount
GlobalUnlock
LocalAlloc
GetModuleHandleA
GlobalFree
MulDiv
SizeofResource
QueryDosDeviceW
FindFirstVolumeW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
lstrlenW
GetStdHandle
RemoveDirectoryW
FindResourceA
OpenProcess
lstrcatW
LockResource
LoadResource
LocalFree
GetFileSize
FindVolumeClose
GetVolumePathNamesForVolumeNameW
lstrcpyW
SetConsoleOutputCP
FormatMessageA
FindNextVolumeW
AllocConsole
SetLastError
GetModuleFileNameA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapSize
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapReAlloc
GetACP
GetModuleHandleExW
MoveFileExW
RtlUnwind
RaiseException
LoadLibraryExW
VirtualProtect
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetLocaleInfoA
ExitProcess
CreateMutexA
GetModuleFileNameW
GetLongPathNameW
GetLastError
WaitForSingleObject
ExpandEnvironmentStringsA
FindNextFileA
FindFirstFileA
MoveFileW
SetFilePointerEx
GetLogicalDriveStringsA
DeleteFileW
DeleteFileA
SetFileAttributesW
GetFileAttributesW
CreateFileW
FindClose
lstrlenA
GetDriveTypeA
FindNextFileW
GetFileSizeEx
FindFirstFileW
CreateDirectoryW
CreateProcessA
Sleep
PeekNamedPipe
CreatePipe
TerminateProcess
WriteFile
ReadFile
HeapFree
HeapCreate
CreateEventA
GetLocalTime
CreateThread
CloseHandle
SetEvent
CreateEventW
lstrcmpW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
DecodePointer
EncodePointer
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
WaitForSingleObjectEx
ResetEvent
SetEndOfFile
user32
ExitWindowsEx
TranslateMessage
DispatchMessageA
GetMessageA
GetWindowTextW
SetForegroundWindow
SetClipboardData
GetClipboardData
EnumWindows
MessageBoxW
IsWindowVisible
CloseWindow
GetWindowThreadProcessId
SendInput
EnumDisplaySettingsW
mouse_event
MapVirtualKeyA
DrawIcon
GetSystemMetrics
GetIconInfo
SystemParametersInfoW
GetForegroundWindow
GetCursorPos
RegisterClassExA
AppendMenuA
CreateWindowExA
DefWindowProcA
TrackPopupMenu
CreatePopupMenu
SetWindowTextW
EmptyClipboard
CloseClipboard
OpenClipboard
ShowWindow
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
StretchBlt
GetDIBits
DeleteDC
DeleteObject
CreateDCA
GetObjectA
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegEnumKeyExA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
ControlService
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyA
shell32
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
ShellExecuteW
shlwapi
StrToIntA
PathFileExistsA
PathFileExistsW
winmm
PlaySoundW
mciSendStringW
mciSendStringA
ws2_32
connect
socket
recv
WSAGetLastError
WSAStartup
closesocket
htons
htonl
getservbyname
inet_ntoa
ntohs
getservbyport
inet_addr
gethostbyaddr
gethostbyname
send
WSASetLastError
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
gdiplus
GdipGetImageEncoders
GdipFree
GdipLoadImageFromStream
GdipSaveImageToStream
GdiplusStartup
GdipGetImageEncodersSize
GdipCloneImage
GdipAlloc
GdipDisposeImage
wininet
InternetOpenUrlW
InternetCloseHandle
InternetReadFile
InternetOpenW
Sections
.text Size: 302KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ