General
-
Target
Remcos Professional.exe
-
Size
6.5MB
-
Sample
230325-wm61nsfh5w
-
MD5
1ecae7b88236fff686604c40f2ec8ef0
-
SHA1
5338d387c764b7da0a097e4dd38c17c603e62b08
-
SHA256
95a3f82e8e77aeb491d7faaf17c4f206763ff7eb08b8696e28ad109b67b984cf
-
SHA512
6a396bf98181250a2a386c2ee4dbcd8a4be6e23de029d614296e6f33a66b6f6049b487ef07d70936812c31f6cce7bb1b709361b749e0b1ad3507382b26c00a5c
-
SSDEEP
196608:CyDxS34Qskc93Uuze5VbN0Wp4ctz7Z9aVi:txb1kcWuzku84cNd
Behavioral task
behavioral1
Sample
Remcos Professional.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
Remcos Professional.exe
-
Size
6.5MB
-
MD5
1ecae7b88236fff686604c40f2ec8ef0
-
SHA1
5338d387c764b7da0a097e4dd38c17c603e62b08
-
SHA256
95a3f82e8e77aeb491d7faaf17c4f206763ff7eb08b8696e28ad109b67b984cf
-
SHA512
6a396bf98181250a2a386c2ee4dbcd8a4be6e23de029d614296e6f33a66b6f6049b487ef07d70936812c31f6cce7bb1b709361b749e0b1ad3507382b26c00a5c
-
SSDEEP
196608:CyDxS34Qskc93Uuze5VbN0Wp4ctz7Z9aVi:txb1kcWuzku84cNd
Score10/10-
Luca Stealer payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
out.upx
-
Size
25.2MB
-
MD5
44abf204408a9691b797ed3eca7c141e
-
SHA1
37a256f7ea24d2a3efb924beb2bd4b6f6354bb90
-
SHA256
0a985d8208e01a09c6eaaa93c6553b4c939e3a0479f0218c11628f3a449b760b
-
SHA512
caf451e21e77fab3513e0c27868f7fed4ce35c87a5a85bb7e68cafe14062e8a0efb00b02de0bd760516035d43069a4c4b5f8c822d49b540c59689eec710446d0
-
SSDEEP
98304:SQYGSiMouUxqvy5g1inLlLJM1Baxedyw+RThSAM9IfPzjs10nE/1h7aQrA0r+7iB:LYV2qvULJM10xe8j5A10n+KTomGoOM
Score1/10 -