General

  • Target

    shitty rat and stealer collection NEW!.zip

  • Size

    8.1MB

  • MD5

    db256a79d74671e4d32f9da396a8a7c4

  • SHA1

    ea2317fcf400211338e0bf0d39e92c2c5dfcfb90

  • SHA256

    e36e49e1cea0dd836cfb1dec293f5fc5c7c197c4eb2df035458a6a5d00265137

  • SHA512

    f4f5db220fe7b4cfbb650cd871ca0efcaaf4523de7e0c6ee0ca4a84b316ab4ae3aca250bb47cf3cbcb6b81d62ccfa760f935eec80f27587c61690b4d8d7db39b

  • SSDEEP

    196608:V/S3A3rlandL+7IVhRTYsw18HpZjPDFjQSJrU+u:V/S32rcdbVHbj7llpu

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

stopeet.camdvr.org:2404

amalar.camdvr.org:2404

prosir.casacam.net:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    abj.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    b2bhdjdhbvduhdi3ed-F3Q5YI

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Extracted

Family

vidar

C2

https://t.me/sc1phell

https://steamcommunity.com/profiles/76561199819539662

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Remcos family
  • Vidar family
  • Unsigned PE 6 IoCs

    Checks for missing Authenticode signature.

Files

  • shitty rat and stealer collection NEW!.zip
    .zip
  • 36.exe
    .exe windows:6 windows x86 arch:x86

    c67ef5a5a21b6fceb58b3ff6fde243b5


    Code Sign

    Headers

    Imports

    Sections

  • Enalib.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • RDriver.exe
    .exe windows:6 windows x64 arch:x64

    c5de145613243b56049bc813390996d0


    Headers

    Imports

    Sections

  • SDriver.exe
    .exe windows:6 windows x86 arch:x86

    9cbefe68f395e67356e2a5d8d1b285c0


    Headers

    Imports

    Sections

  • T.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • autoruns.exe
    .exe windows:6 windows x86 arch:x86

    fc18756ef5e758178da800fd88864516


    Code Sign

    Headers

    Imports

    Sections

  • e.exe
    .exe windows:5 windows x86 arch:x86

    029a987f21e33b48f24d21b6f9ff1129


    Headers

    Imports

    Sections

  • fake jpg shit.lnk
    .lnk
  • fake photo.lnk
    .lnk
  • noyjhoadw.exe
    .exe windows:6 windows x86 arch:x86

    84ba17106ada936d580064070fd488b4


    Headers

    Imports

    Exports

    Sections

  • unins000.exe
    .exe windows:6 windows x86 arch:x86

    759c48933c0c1dbcbbe95436a5f5c2b6


    Code Sign

    Headers

    Imports

    Exports

    Sections

  • use for bypassing taskmgr block.exe
    .exe windows:6 windows x86 arch:x86

    dbc825879296e020d5134f3622c3aca0


    Code Sign

    Headers

    Imports

    Sections