General
-
Target
BETT AWB8876E73_SEPT1721,pdf.exe
-
Size
1.4MB
-
Sample
211004-qnzp4agdb8
-
MD5
2177743409ec5fd02a58e371ad413429
-
SHA1
b739d4ee9fe36a1ac527e588ce3f05f8fc73c322
-
SHA256
b3830ac26206a05fa89bb58269aab31ec7edb2cd1c77c9bea6332e53363eb83e
-
SHA512
f6d21a56c5ed89c3f8fffcd5720ec774ad48f2f53d1fa23a45957a8e7d4f869c67531d85e908c0756328382d3acc3723653a1f5eff3a86f91d7859ebc42db5b5
Static task
static1
Behavioral task
behavioral1
Sample
BETT AWB8876E73_SEPT1721,pdf.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
BETT AWB8876E73_SEPT1721,pdf.exe
Resource
win10v20210408
Malware Config
Extracted
remcos
3.2.1 Pro
CELEBRATION
ongod4ever.ddns.net:3030
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-FCUJUB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Targets
-
-
Target
BETT AWB8876E73_SEPT1721,pdf.exe
-
Size
1.4MB
-
MD5
2177743409ec5fd02a58e371ad413429
-
SHA1
b739d4ee9fe36a1ac527e588ce3f05f8fc73c322
-
SHA256
b3830ac26206a05fa89bb58269aab31ec7edb2cd1c77c9bea6332e53363eb83e
-
SHA512
f6d21a56c5ed89c3f8fffcd5720ec774ad48f2f53d1fa23a45957a8e7d4f869c67531d85e908c0756328382d3acc3723653a1f5eff3a86f91d7859ebc42db5b5
Score10/10-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-