General
-
Target
RFQ DOC0029928938211.exe
-
Size
489KB
-
Sample
230511-janmcaeb81
-
MD5
5d02e9834d5a3a6465aa8fa7f6b51490
-
SHA1
fa94cfebae5c55a70c175e6f26641d7561d727e5
-
SHA256
82135f6f510ef27ec3e78249e0d2bf276a8890385b47e65391756b7f254c487b
-
SHA512
db664595696c4ed8585b3b35e5bd6dc01b90b11c84054fd38e2e6604ad685ff30f29f26e66aa697d7f41fd3853948e2820c5655951b2e087a331bcb5a03e33e2
-
SSDEEP
12288:Wzd8UZp23enmUF0NAGvsmEhzkCDlFMddoudBYM4:WRBZpkmF7GEXJkqlFo7d4
Static task
static1
Behavioral task
behavioral1
Sample
RFQ DOC0029928938211.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ DOC0029928938211.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
remcos
RemoteHost
155.94.185.15:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FUG8H1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ DOC0029928938211.exe
-
Size
489KB
-
MD5
5d02e9834d5a3a6465aa8fa7f6b51490
-
SHA1
fa94cfebae5c55a70c175e6f26641d7561d727e5
-
SHA256
82135f6f510ef27ec3e78249e0d2bf276a8890385b47e65391756b7f254c487b
-
SHA512
db664595696c4ed8585b3b35e5bd6dc01b90b11c84054fd38e2e6604ad685ff30f29f26e66aa697d7f41fd3853948e2820c5655951b2e087a331bcb5a03e33e2
-
SSDEEP
12288:Wzd8UZp23enmUF0NAGvsmEhzkCDlFMddoudBYM4:WRBZpkmF7GEXJkqlFo7d4
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-