General
-
Target
653f628893de874793983dc90b8868c7e56229e28f7eaf79d615c55490179411.zip
-
Size
347KB
-
Sample
231119-3t8leade9x
-
MD5
7bade54dcfd7d3889d7e5d5de6a30c02
-
SHA1
b542231cb1b40c8a2ecd89cf8b0712c309f73dd6
-
SHA256
9ea871b617db749d2998de67e2f53633dc40f17e6cdb4d1f4f68d71a3901fb31
-
SHA512
e24c48f348a8fe8b12339c41b18633312342c997012101a67c5dab197d7cdb1bc04f4edc07a47cd5ca91777cc03744a59889572ed3edb3d129227f18cc00644c
-
SSDEEP
6144:ZIkR/iQIRLzqmqskqh6qr1d2D3B0h7OiPyFUpyCk+TzKk1c/P4345ywf2d/M7g8A:Z3R/iQUPqmJx9c38iPyY8J1c/Q345ywQ
Static task
static1
Behavioral task
behavioral1
Sample
653f628893de874793983dc90b8868c7e56229e28f7eaf79d615c55490179411.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
653f628893de874793983dc90b8868c7e56229e28f7eaf79d615c55490179411.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
remcos
JOHN-PC
107.175.229.139:8087
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IN4YDY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
653f628893de874793983dc90b8868c7e56229e28f7eaf79d615c55490179411.exe
-
Size
360KB
-
MD5
baa40e739a7b86a71f5ce1cc9ef151b8
-
SHA1
67c7f0cf57aff173413f0ba17e9ec5052f1aac86
-
SHA256
653f628893de874793983dc90b8868c7e56229e28f7eaf79d615c55490179411
-
SHA512
a6bf3aa52d35cc7119bce93b5166dec0f48692db7b394d54d656a1e8c3871dbfaa17391f894a26d2cedad4d09c316525b122f1689941bd92e008b47940436dbc
-
SSDEEP
6144:wBlL/71aRFGx1f1M/bwy2TtkyVIfjdiYfoRK7pvcHFyXX/Q+dClyOIyS:CJ1GGdcbwy2kyVIblgc1E6XY+dxO7S
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-