General
-
Target
c44105dd1c7bd6a431c4bdfff8a6eba45a8d279120ac270dcb3698087c325f15
-
Size
706KB
-
Sample
221104-fz37jsbgc7
-
MD5
27649fea6fa0c5141d8754ab94cfc845
-
SHA1
9fd425a27933eb58577f3699ae48a10d6139b5c0
-
SHA256
c44105dd1c7bd6a431c4bdfff8a6eba45a8d279120ac270dcb3698087c325f15
-
SHA512
2c29c7991ea0604edbf933f9be2b8bf9412dfd5831124752cfdc591fa3bb775629571c5733df71ac0d54264c4de357c8149ae6183080583f1deadef2f9ac266a
-
SSDEEP
12288:K1rxya6oFYi/lPNMVIV6p3uuQvb//K2AR8DEoKTgWZ0mjJSJPqOlzeS0j6iNq:qy2FYi/lP43Kvry2AugsWZ0mjJaqwtnt
Static task
static1
Behavioral task
behavioral1
Sample
2022-11-4 报价请求.PDF.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2022-11-4 报价请求.PDF.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
remcos
NEW REM STUB
valvesco.duckdns.org:5050
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-48V73L
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2022-11-4 报价请求.PDF.exe
-
Size
1.1MB
-
MD5
b80414e3202a808673a8254aec607a12
-
SHA1
fef5c52c3af36689f3c794ce586d83b0a458afa5
-
SHA256
5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b
-
SHA512
3e1a4e4918b2b64238403811348248ff5955793cf405087edaac332461c74ee3d26b21f814565d22ae4f30cc4436821ac7f9fcdc61cae38d1ce8adf3ff2609b3
-
SSDEEP
24576:ZH14Ct7BwWTmQHsOzj4j85M1hUQDAxzJX4K4hGxosG:ZHGW7BwWtsOzj4jGM1aK4FX3
Score10/10-
Modifies WinLogon for persistence
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-