General
-
Target
95.214.24.120_-_vect_-_WWEESSCXDDGJ.exe___4dd854935958419bfa8c5b5990ef0cc4.dat
-
Size
582KB
-
Sample
221005-pd8pkseecm
-
MD5
4dd854935958419bfa8c5b5990ef0cc4
-
SHA1
8b60819fd23f870d850b25bb5cb7cbe8ffdc835f
-
SHA256
1e77a63d27b905f5e8ca03706a05367522c8a4fe900d1b2e3f0cb06cc5ff78a3
-
SHA512
ed283da562669017d18f719d2a51578f78c080706f15ba9fceacdae43b4223578d8ca893382756675e2a3ec814af60e7743c511e0146a352590d2b106d461eb4
-
SSDEEP
12288:9rWfmDi7yIEnMcEz0bwVaYGUJ5ThYpPR7:9rW3OEowQqxhQ7
Static task
static1
Behavioral task
behavioral1
Sample
95.214.24.120_-_vect_-_WWEESSCXDDGJ.exe___4dd854935958419bfa8c5b5990ef0cc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95.214.24.120_-_vect_-_WWEESSCXDDGJ.exe___4dd854935958419bfa8c5b5990ef0cc4.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
remcos
NEW
remcapi.duckdns.org:2028
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
FILE.EXE
-
copy_folder
work
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-L9LQMY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
file
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
95.214.24.120_-_vect_-_WWEESSCXDDGJ.exe___4dd854935958419bfa8c5b5990ef0cc4.dat
-
Size
582KB
-
MD5
4dd854935958419bfa8c5b5990ef0cc4
-
SHA1
8b60819fd23f870d850b25bb5cb7cbe8ffdc835f
-
SHA256
1e77a63d27b905f5e8ca03706a05367522c8a4fe900d1b2e3f0cb06cc5ff78a3
-
SHA512
ed283da562669017d18f719d2a51578f78c080706f15ba9fceacdae43b4223578d8ca893382756675e2a3ec814af60e7743c511e0146a352590d2b106d461eb4
-
SSDEEP
12288:9rWfmDi7yIEnMcEz0bwVaYGUJ5ThYpPR7:9rW3OEowQqxhQ7
Score10/10-
Adds policy Run key to start application
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-