General
-
Target
12d40f09ff572ec60039c1a9b761f65b414c30831d5024f54e7a1098213a1b45
-
Size
1.0MB
-
Sample
230110-a5tbmsbg8s
-
MD5
a9b0045fe681c2057bbe60df4b0ec6a5
-
SHA1
dd276f7ecf9f6b0567467295771b87259077e744
-
SHA256
12d40f09ff572ec60039c1a9b761f65b414c30831d5024f54e7a1098213a1b45
-
SHA512
ea8cdac09a34fc1b9d07c694a95462648586370b6d8a8289da7faec56ce55d79b83aaab169f7a9b565ed97de270149277f385076f680ee2d00bd77762546df3b
-
SSDEEP
24576:BIO1txcEN6fX8oH8xrUcfjDQIE3U/CqEZV/NWCsgfzC:5t686fh8xrUcbDdE3nqEZVugf
Static task
static1
Behavioral task
behavioral1
Sample
12d40f09ff572ec60039c1a9b761f65b414c30831d5024f54e7a1098213a1b45.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
remcos
waltar-Host 2023
muwkege4.zapto.org:2290
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
qqs.exe
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-5AOFL5
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
ksd
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
12d40f09ff572ec60039c1a9b761f65b414c30831d5024f54e7a1098213a1b45
-
Size
1.0MB
-
MD5
a9b0045fe681c2057bbe60df4b0ec6a5
-
SHA1
dd276f7ecf9f6b0567467295771b87259077e744
-
SHA256
12d40f09ff572ec60039c1a9b761f65b414c30831d5024f54e7a1098213a1b45
-
SHA512
ea8cdac09a34fc1b9d07c694a95462648586370b6d8a8289da7faec56ce55d79b83aaab169f7a9b565ed97de270149277f385076f680ee2d00bd77762546df3b
-
SSDEEP
24576:BIO1txcEN6fX8oH8xrUcfjDQIE3U/CqEZV/NWCsgfzC:5t686fh8xrUcbDdE3nqEZVugf
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-