General
-
Target
Consignment Deatails BL and INV20220310.js
-
Size
1KB
-
Sample
221003-jtvj1afehp
-
MD5
1e5e1fad2b73dc88965c3edf8adbbbee
-
SHA1
e2ba062cfe5e48b1828b0cbcb868ac95079ed5e4
-
SHA256
f300f3c9ee1d722fa3460dfef58fae49568bfb14f7576d7c4ecf27a34408d0f7
-
SHA512
2145b0ce036a57612dcd7cae3befbcae5f3f4ee02b15e7c6fb2988cc427268b37f825a908878a2366cad3d527f85a3b8ba776b080708d7ae596b58991195f426
Static task
static1
Behavioral task
behavioral1
Sample
Consignment Deatails BL and INV20220310.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Consignment Deatails BL and INV20220310.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
remcos
RemoteHost
79.134.225.36:3400
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DEEVUN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Consignment Deatails BL and INV20220310.js
-
Size
1KB
-
MD5
1e5e1fad2b73dc88965c3edf8adbbbee
-
SHA1
e2ba062cfe5e48b1828b0cbcb868ac95079ed5e4
-
SHA256
f300f3c9ee1d722fa3460dfef58fae49568bfb14f7576d7c4ecf27a34408d0f7
-
SHA512
2145b0ce036a57612dcd7cae3befbcae5f3f4ee02b15e7c6fb2988cc427268b37f825a908878a2366cad3d527f85a3b8ba776b080708d7ae596b58991195f426
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-