General
-
Target
USD23.026,90 (Tiller Order).docx
-
Size
10KB
-
Sample
230313-n8ffvacc9v
-
MD5
40fa41596ac736f6e23965c0094bb946
-
SHA1
c64c3183fb4466cce653d55743d40ff156606754
-
SHA256
eabdfa7af51b0ad6d49602685f207ce19dfe287dd6cfc808b53fb4e580734f50
-
SHA512
83e57aa3b75462ffe3fa1481af6e4694050b64074492d4f22ba5b0fedb83087037846d4c6cd7933619405ac7f8bbf803739e3cf640f453e50a9634729f718845
-
SSDEEP
192:ScIMmtP1aIG/bslPL++uOsAl+CVWBXJC0c3CV:SPXU/slT+LOBHkZC9i
Static task
static1
Behavioral task
behavioral1
Sample
USD23.026,90 (Tiller Order).docx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
USD23.026,90 (Tiller Order).docx
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://ZZZ0000SDFDS0F0000000Z0Z00000000ZZ000000000000W0WW0W0W0W0W0W0W00W0W0W0W00Z0Z0Z0Z0Z0Z00Z0Z0Z00W0W0W00W@2401929236/80................80...................80.doc
Extracted
remcos
RemoteHost
vcv.mastercoa.co:8489
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4IE8MY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
USD23.026,90 (Tiller Order).docx
-
Size
10KB
-
MD5
40fa41596ac736f6e23965c0094bb946
-
SHA1
c64c3183fb4466cce653d55743d40ff156606754
-
SHA256
eabdfa7af51b0ad6d49602685f207ce19dfe287dd6cfc808b53fb4e580734f50
-
SHA512
83e57aa3b75462ffe3fa1481af6e4694050b64074492d4f22ba5b0fedb83087037846d4c6cd7933619405ac7f8bbf803739e3cf640f453e50a9634729f718845
-
SSDEEP
192:ScIMmtP1aIG/bslPL++uOsAl+CVWBXJC0c3CV:SPXU/slT+LOBHkZC9i
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Abuses OpenXML format to download file from external location
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-