General
-
Target
5.exe
-
Size
16KB
-
Sample
220915-qw18wsdcb6
-
MD5
209cd0d408d821f807779a8302fc665b
-
SHA1
f822179aa935735dd2d815b86f47f0881f4f7b11
-
SHA256
af38ed65e2180fd0e6327d2615acf72e514577fbadfdde7d8f6d5b5d0eaf8740
-
SHA512
7ba14528bb8b2e03a8a501d0e20318de2390a27f7be475cd4a3382665b7bf294615c23d3d6c9b61797eaf331aac21c48a394bd9963f02d3eaab9a04ee18b71aa
-
SSDEEP
384:feruGi1pbpN4zpreA9Lna27T3A0iJj+9:feC/pUvhnR+a
Static task
static1
Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
remcos
RemoteHost
obologs.work.gd:4044
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-F9UER6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
formbook
hqbo
mwc6l86PJPZCD9Gt0q391w==
h8WuFPEOFmGLG1Q=
7dt6icaDMSJXNKQRxmsc
VCPQuBGfPDQ74U/hUBcSJRSrwF0=
wespuyTDPCBIysXwj4/23w==
qJYwD3wmybIoqYGP6GoU
N9H9UYIs27f3w+D5j4/23w==
ZDeOOF0sDqq2x+jq
jAZ9j/SZVUuJTK4Rxmsc
syg3zEQb0sUwxTTi
0F23IFLzE2AL2twRDObSkE8=
dpC9Ta1LZLCPptrveCsXkYeT
Z3uaQFxP3gc89j71
e5i3FoJZ48LqdoGXXA==
KIuwBF4KZnpdVw==
oCqfe+J14bIwxTTi
ICIFWLyScNx5Ug==
d/sqxzgYSyaNJVU=
2/UghriHtprPTURW3595e68NMJLPos4=
pEfdvFgCbU5jImqCXg==
xRY1X8CTw1ZDTl6VjjGHNuX7Ig==
tlEF5g+xmkF9M/wflhWQNuX7Ig==
vOgLjMpsCQBs+Gr7
CeHgaqpCr5kVHrdEO6aAT0GO6BtR
w814UoMhQoHxDp41lCCTNuX7Ig==
InWi/F4DHZNHEGTivUBE7IjQNtRuVnvw
ldEKkMFZB/cn+L/wj4/23w==
Q63RNmr3jnmfaDoRxmsc
i4V11kDR1mGLG1Q=
eEXx3EQVtIeWIdX635fZlRSrwF0=
rcBzhfDD9mtXTUNZVAkx7K3ynpLPos4=
i5cvDoFRgw3NleSbFf8MIRSrwF0=
3ilb8GU63rzHu5aeggoTJRSrwF0=
iZdGKFXl/nlj9vj8j4/23w==
N74zAiuYD+1fed+2qBc=
32eN818rDqq2x+jq
eDXh8Ff1t7EwxTTi
h1Huwu6DIPY8AL7wj4/23w==
UMM6Cj3Oa1iVY4xs5opONkGO6BtR
eyXY51brhXe6bzVEoBqQNuX7Ig==
o2rVoM073NxWYgKOeyrqhUU=
A6cp8SXtClrq8Iv1smYW
AZsJ3zzXbTRzQ6URxmsc
EUA7zzjJbGhwCV/mUwvFc0qO6BtR
ixg6ZMjm31+C
01t4z/Zk26yhpbm8mF2eNuX7Ig==
mJCTGVLkhWpkImqCXg==
b5mM9VLsNd1OEU0=
rOviLl35lWdjImqCXg==
582hhvLNfmWjaDoRxmsc
jbm1DkEDo3aqeZuNXgA=
fAkqjvqYEe489j71
1cJZZ8x1lvFvdAZkA5Ag6tUOKA==
7CMOYp5bCwOIBdXq
TUMrVn4ILqBCHzE4qTUXkYeT
AllB1rXX/GGLG1Q=
Pfmwi7Yqz8Dvu4SJTSeRNuX7Ig==
YYKtFIJViQnvdTYRxmsc
vc96WLxZY/CscbhmcirqhUU=
KJX0DDtcZnpdVw==
nI0xGoIeGV7U31D+47MSxnJznEQ=
T/mkVaQ3U9LrvUXUxis9ywxcArpZ
yHfkl/GSGlpgXQ==
78/JEW8UH6SQF8bWrJUt//0fwu/8GNr4
dmlongyue.com
Targets
-
-
Target
5.exe
-
Size
16KB
-
MD5
209cd0d408d821f807779a8302fc665b
-
SHA1
f822179aa935735dd2d815b86f47f0881f4f7b11
-
SHA256
af38ed65e2180fd0e6327d2615acf72e514577fbadfdde7d8f6d5b5d0eaf8740
-
SHA512
7ba14528bb8b2e03a8a501d0e20318de2390a27f7be475cd4a3382665b7bf294615c23d3d6c9b61797eaf331aac21c48a394bd9963f02d3eaab9a04ee18b71aa
-
SSDEEP
384:feruGi1pbpN4zpreA9Lna27T3A0iJj+9:feC/pUvhnR+a
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-