General
-
Target
purchase inquiry(Schmersal) AS894 - HU633.img
-
Size
70KB
-
Sample
221101-gqkvaagfd5
-
MD5
61238f7fcdeabbaa8f5028c9322621fe
-
SHA1
7a0328bbd496e1c994876195e68d591454e98172
-
SHA256
a4d30f60d3bcee2bdbb9c5bba47f83b186efce182f3108f9e6ca0a6a09a1f2bc
-
SHA512
2208e250748a416722bfe1a033d3b27976783ed9c09c25137b1859514448d4ae6facfd1e79f86c19a5f7fde6de57153facddfc7b2fa7b3b6f8e5fa4ebef0fcd2
-
SSDEEP
192:YTEynR4X1K+N8ROIGpYpyeDyPC8stYcFmVc03KY:I1R4XPyROIxqPCptYcFmVc03K
Static task
static1
Behavioral task
behavioral1
Sample
purchase inquiry(Schmersal) AS894 - HU633.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
purchase inquiry(Schmersal) AS894 - HU633.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
remcos
RemoteHost
obologs.work.gd:4044
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GPG7FU
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
lokibot
http://63.250.44.84/cpanel.php?id=7142923716380768932330405157671485688969698674568701752368135274833639699
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
purchase inquiry(Schmersal) AS894 - HU633.exe
-
Size
9KB
-
MD5
2f9cbfad6b863d1f2fab79ded5c6d178
-
SHA1
c28bc742ecd706dfec4713d992c411d067900ca5
-
SHA256
6d5486d773d521ca26d1e092dc07f044ab75d0fa303780ef2216b443c1897c93
-
SHA512
d3ea48e143c6aa6303776866295fe37c640ba9d0a76d7e14d1f3e4caa115233a373dac90be7ca82ebc40382f103c7a55780c7c78c7375533d1eacc8685a337a9
-
SSDEEP
192:f4X1K+N8ROIGpYpyeDyPC8stYcFmVc03KY:f4XPyROIxqPCptYcFmVc03K
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-