General
-
Target
Agenzia_Entrate (20)(1).js
-
Size
4KB
-
Sample
231124-pebfgabe2x
-
MD5
34a5dd0102028beff127a458276fdb43
-
SHA1
0f428b7ecee697d5a4be044a776f5e37e3435fd5
-
SHA256
8e7f45ba404445ce4b890adbae3660c3a3d25a4e25d2cd5c1c63e84d9bfb293c
-
SHA512
d4b5f65eba75ee3813966797febefe2a4d32e6c9accbd369f14988d913c1fe46fe540020f910293f3829854294877d61bb5c9fbb6451850fe842f636c779132a
-
SSDEEP
96:a3w8+mAFu1VeheOC0uzmMdOs5GcgbrwXM8TGfJwAm/Ilcj2:a3wfFUegOZuiUfgXw86sw92
Static task
static1
Behavioral task
behavioral1
Sample
Agenzia_Entrate (20)(1).js
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Agenzia_Entrate (20)(1).js
Resource
win10v2004-20231020-en
Malware Config
Extracted
remcos
RemoteHost
listpoints.online:6090
retghrtgwtrgtg.bounceme.net:3839
listpoints.click:7020
datastream.myvnc.com:5225
gservicese.com:2718
center.onthewifi.com:8118
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
explorer.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BXAQVH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Agenzia_Entrate (20)(1).js
-
Size
4KB
-
MD5
34a5dd0102028beff127a458276fdb43
-
SHA1
0f428b7ecee697d5a4be044a776f5e37e3435fd5
-
SHA256
8e7f45ba404445ce4b890adbae3660c3a3d25a4e25d2cd5c1c63e84d9bfb293c
-
SHA512
d4b5f65eba75ee3813966797febefe2a4d32e6c9accbd369f14988d913c1fe46fe540020f910293f3829854294877d61bb5c9fbb6451850fe842f636c779132a
-
SSDEEP
96:a3w8+mAFu1VeheOC0uzmMdOs5GcgbrwXM8TGfJwAm/Ilcj2:a3wfFUegOZuiUfgXw86sw92
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-