General
-
Target
localDocker_beta_v4.exe
-
Size
1.1MB
-
Sample
231128-kg1qxsgf9v
-
MD5
bc12cafc59b9bceb8d6534e94a0725dd
-
SHA1
12159e976340d59490003eb099ddd08b43ed2265
-
SHA256
b5ef5eb3ab074c2213f3e16ec1fef05af1f9d397181ffe6a33bd4a04ba218e62
-
SHA512
643eb208ca2b7ba1b2065857155e669c422f35545de8704b6d69e1177215cf2d1996d58709cb368dc0ba520e03a62eee4ae8cf54797f6c4a3f56eda0450e5e6b
-
SSDEEP
24576:JmAn2oOjSmtKI6F920fjj0k7oOJd9eZEdRauWhmAMJ8vDjn5xyoX:5FboO7XWhBH/
Static task
static1
Behavioral task
behavioral1
Sample
localDocker_beta_v4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
localDocker_beta_v4.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
remcos
RemoteHost
retghrtgwtrgtg.bounceme.net:3839
listpoints.click:7020
datastream.myvnc.com:5225
gservicese.com:2718
center.onthewifi.com:8118
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
explorer.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-OPX7KW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
localDocker_beta_v4.exe
-
Size
1.1MB
-
MD5
bc12cafc59b9bceb8d6534e94a0725dd
-
SHA1
12159e976340d59490003eb099ddd08b43ed2265
-
SHA256
b5ef5eb3ab074c2213f3e16ec1fef05af1f9d397181ffe6a33bd4a04ba218e62
-
SHA512
643eb208ca2b7ba1b2065857155e669c422f35545de8704b6d69e1177215cf2d1996d58709cb368dc0ba520e03a62eee4ae8cf54797f6c4a3f56eda0450e5e6b
-
SSDEEP
24576:JmAn2oOjSmtKI6F920fjj0k7oOJd9eZEdRauWhmAMJ8vDjn5xyoX:5FboO7XWhBH/
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-