General
-
Target
648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa
-
Size
273KB
-
Sample
230526-gmmjpsef5x
-
MD5
9e925b69e3dbb48c606de897284d31ae
-
SHA1
3ac4fba103c1e58bf0ab6086c3195a4ec99434e6
-
SHA256
648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa
-
SHA512
5d21d022b8c417f96da49abfa75e0514d45e99ac49956b1b05b73db35267dfeae0cc8beb7d6396fa3f42ed50bcebdc0bc62a39ea6edc1029cb5a3bc33693a61b
-
SSDEEP
3072:NJQHFFX6f+uKVWyxLvZ2RFIEtg6o5dqGDQSQmYI6Lw3VfsB75zk6By5kGl4TbqNC:YlFqfqxLARFN+8wGN5zk+yiVPnbM
Static task
static1
Behavioral task
behavioral1
Sample
648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
remcos
RemoteHost
divdemoce.duckdns.org:35639
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
dtas.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-GZATCK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa
-
Size
273KB
-
MD5
9e925b69e3dbb48c606de897284d31ae
-
SHA1
3ac4fba103c1e58bf0ab6086c3195a4ec99434e6
-
SHA256
648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa
-
SHA512
5d21d022b8c417f96da49abfa75e0514d45e99ac49956b1b05b73db35267dfeae0cc8beb7d6396fa3f42ed50bcebdc0bc62a39ea6edc1029cb5a3bc33693a61b
-
SSDEEP
3072:NJQHFFX6f+uKVWyxLvZ2RFIEtg6o5dqGDQSQmYI6Lw3VfsB75zk6By5kGl4TbqNC:YlFqfqxLARFN+8wGN5zk+yiVPnbM
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-