General
-
Target
961c9c4f65267e43e44e13b6bf265f6f.exe
-
Size
328KB
-
Sample
230312-v8vzvseg32
-
MD5
961c9c4f65267e43e44e13b6bf265f6f
-
SHA1
33776c4a9f5989f733f6047cd3fbecb488d1688b
-
SHA256
156432010c9c69932d05b3420b22ae89d29e4d858e0626031ed4856f1b3a00cd
-
SHA512
40518c46518d6170793acbf7322b0ffebdafe38c627ec0810444b02ed73c4a5a2bc3bedde39dc6c6d214e6db33cfc253ffda6264bde9559b7593e9b6fdab20bb
-
SSDEEP
6144:+Ya6e3D2t9hg068nDs+wW2bRmLhW4dlNNwl4jmfX5GJBL12Q0u:+YY3D2L68nDdwW2VUJdlNNQkmv5GZ2Qf
Static task
static1
Behavioral task
behavioral1
Sample
961c9c4f65267e43e44e13b6bf265f6f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
961c9c4f65267e43e44e13b6bf265f6f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
remcos
RemoteHost
top.noforabusers1.xyz:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-5DQBA4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
formbook
4.1
ho62
aqawonky.com
ancachsroadsideassistance.com
artologycreatlive.com
olesinfo.africa
lovebreatheandsleep.com
friendsofdragonsprings.com
homecomingmums.wiki
hg222.bet
precision-spares.co.uk
generalhospitaleu.africa
touchstone4x4.africa
dynamator.com
dental-implants-52531.com
efefear.buzz
bentonapp.net
89luxu.com
bridgesonelm.com
acesaigon.online
instantapprovals.loans
evuniverso.com
kasoraenterprises.com
instasteamer.com
granolei.com
iamavisioniar.site
beachexplo.com
ynametro.com
littlegallery-rovinj.com
27og.com
horrorcity.online
zexo.africa
perdeumane.com
drugsaddiction.co.uk
tickleyourfancy.africa
jimyhq.top
rajputnetwork.co.uk
lacuspidehn.com
bestxdenotecyby.top
gg10siyahposet.xyz
biorigin.co.uk
jye-group.com
digito.exposed
eternalstw.com
schjetne.dev
climateviking.com
easysaldoya.xyz
1233332.xyz
centerverified.online
lezzetyemekfabrikasi.com
wzshayang.com
cloudadonis.com
zxpz6.com
alifecube.com
induscontrolpcb.site
golfingineurope.com
ducksathomephotos.com
aimeesbellaboutique.com
justrebottle.com
hachettejeunesse.pro
238142.com
casabiancapanama.com
dohenydesalination.com
1-kh.com
cdhptor.xyz
island6.work
ehirtt.com
Targets
-
-
Target
961c9c4f65267e43e44e13b6bf265f6f.exe
-
Size
328KB
-
MD5
961c9c4f65267e43e44e13b6bf265f6f
-
SHA1
33776c4a9f5989f733f6047cd3fbecb488d1688b
-
SHA256
156432010c9c69932d05b3420b22ae89d29e4d858e0626031ed4856f1b3a00cd
-
SHA512
40518c46518d6170793acbf7322b0ffebdafe38c627ec0810444b02ed73c4a5a2bc3bedde39dc6c6d214e6db33cfc253ffda6264bde9559b7593e9b6fdab20bb
-
SSDEEP
6144:+Ya6e3D2t9hg068nDs+wW2bRmLhW4dlNNwl4jmfX5GJBL12Q0u:+YY3D2L68nDdwW2VUJdlNNQkmv5GZ2Qf
-
Formbook payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-