General

  • Target

    26122024_0613_PO-367589-234768-2024.pif.bin

  • Size

    1.0MB

  • Sample

    241226-gyxttaykg1

  • MD5

    98716edbae1078a02120d819dc0b38cf

  • SHA1

    55df0da094c7d568431a84ee901092f32fb36521

  • SHA256

    19606dd36cf68e5629e647ee92361ce9edcad99d3de0f2d131115e7f57421a86

  • SHA512

    15db5adb2a0820a8a294d3f495ca956dbb6e2f72b432c291eabd3cca1cbfae6c08c48e1b047e2a07238326ad9040fa20a665d2d1a16c12c35ec8dd75f9228bb9

  • SSDEEP

    24576:XWniUBQoW1BRCXzcCQQxT0juSRcsBSGNnOj2Do:XgiIW1E74juSRcsBSGNnOj2D

Malware Config

Extracted

Family

remcos

Botnet

SANTA

C2

honeypotresearchteam.duckdns.org:28453

pentester0.accesscam.org:56796

pentester03.gleeze.com:28454

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    chromes.exe

  • copy_folder

    chromes

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-95CQE9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      26122024_0613_PO-367589-234768-2024.pif.bin

    • Size

      1.0MB

    • MD5

      98716edbae1078a02120d819dc0b38cf

    • SHA1

      55df0da094c7d568431a84ee901092f32fb36521

    • SHA256

      19606dd36cf68e5629e647ee92361ce9edcad99d3de0f2d131115e7f57421a86

    • SHA512

      15db5adb2a0820a8a294d3f495ca956dbb6e2f72b432c291eabd3cca1cbfae6c08c48e1b047e2a07238326ad9040fa20a665d2d1a16c12c35ec8dd75f9228bb9

    • SSDEEP

      24576:XWniUBQoW1BRCXzcCQQxT0juSRcsBSGNnOj2Do:XgiIW1E74juSRcsBSGNnOj2D

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • ModiLoader Second Stage

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks