General

  • Target

    EXE_01

  • Size

    1.3MB

  • Sample

    241230-e8ygzsykdv

  • MD5

    a464fb8719fb5230e4f4e7579d91927b

  • SHA1

    42e3f61c947f2b9b0d8b23b7cd41cb5541e777ab

  • SHA256

    a2cdbb92a825919b6394b1512c49b20259ac72d45178e3d463d399c6b0dd554e

  • SHA512

    7635fab336f88248e76f467f5c8559b87e1c2f4556724e586cd5eb5741d33021cbbc45e26f4ef91f03bf509a2de1afaf7aabc748434c753b2bd7c7531798fc72

  • SSDEEP

    12288:haKhY4AdUZ6mJhOaCaVHCKPUwSemDwHM9hvEhqo3zJ/mszm3wOR/ue1:hULl20LaVZ0emwYGqo1FJ8

Malware Config

Extracted

Family

remcos

Botnet

SANTA

C2

honeypotresearchteam.duckdns.org:28453

pentester0.accesscam.org:56796

pentester03.gleeze.com:28454

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    chromes.exe

  • copy_folder

    chromes

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-95CQE9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      EXE_01

    • Size

      1.3MB

    • MD5

      a464fb8719fb5230e4f4e7579d91927b

    • SHA1

      42e3f61c947f2b9b0d8b23b7cd41cb5541e777ab

    • SHA256

      a2cdbb92a825919b6394b1512c49b20259ac72d45178e3d463d399c6b0dd554e

    • SHA512

      7635fab336f88248e76f467f5c8559b87e1c2f4556724e586cd5eb5741d33021cbbc45e26f4ef91f03bf509a2de1afaf7aabc748434c753b2bd7c7531798fc72

    • SSDEEP

      12288:haKhY4AdUZ6mJhOaCaVHCKPUwSemDwHM9hvEhqo3zJ/mszm3wOR/ue1:hULl20LaVZ0emwYGqo1FJ8

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • ModiLoader Second Stage

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks