General
-
Target
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
-
Size
746KB
-
Sample
221124-z6rlwaae58
-
MD5
9140ccdcddf8331c3204be8d3eadeb33
-
SHA1
004fe0732d9065590386bbcc13b834d6bb39d07f
-
SHA256
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
-
SHA512
3a6e7c2e36bc012029d31e3ec8305a10db64f3ebef2a6f38847d9f61776b8029cd03a64951263f7ec4d3cd7782b08c0dd440dd73554dc0e675f4f0d1ecbbc9a7
-
SSDEEP
12288:RqhmZJbxpDFJxbxmnq2Co4a5mJ2pKBaOtg4e/uKy8Kt58bLjKj3/4vjSC:RQixh3OFK0+e/u8KvynKj3/zC
Static task
static1
Malware Config
Extracted
remcos
1.7 Pro
Nov 24th
gcrozona.duckdns.org:6062
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
Microsoft Intel Audios.exe
-
copy_folder
Audio Microsoft File
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows Display
-
keylog_path
%WinDir%
-
mouse_option
false
-
mutex
Windows Audio
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Window Security Check
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
Username;password;proforma;invoice;notepad
Targets
-
-
Target
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
-
Size
746KB
-
MD5
9140ccdcddf8331c3204be8d3eadeb33
-
SHA1
004fe0732d9065590386bbcc13b834d6bb39d07f
-
SHA256
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
-
SHA512
3a6e7c2e36bc012029d31e3ec8305a10db64f3ebef2a6f38847d9f61776b8029cd03a64951263f7ec4d3cd7782b08c0dd440dd73554dc0e675f4f0d1ecbbc9a7
-
SSDEEP
12288:RqhmZJbxpDFJxbxmnq2Co4a5mJ2pKBaOtg4e/uKy8Kt58bLjKj3/4vjSC:RQixh3OFK0+e/u8KvynKj3/zC
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-