General
-
Target
e2473c2832fb852d2aa8785e90b285a0.bin
-
Size
898KB
-
Sample
240113-d5nb6scac3
-
MD5
70e22987350bcd63d2397ea5c86d1755
-
SHA1
479d3b1f12ee63d289ac5c08d3c21846d42b23a8
-
SHA256
b80943dac4aabb6d2bfda1137ad139e66610393b70c482d4aa915d53e0c46067
-
SHA512
e3f1332b35785c233852eeca51c57485ba23aaaaa9c86b9a62b50fe5331419fea03f4e9d4699b30909d566c5f14d7aa646db54e701925020c88e7f6a7f040a75
-
SSDEEP
24576:PXfUsKPCIItv7lcE8KFnP8rS2+0yO57sZkRBgz+1/iDx+Dg+:PXfjKPbk78wnEpy763gz+143+
Static task
static1
Behavioral task
behavioral1
Sample
b67319d5978b2236bb8a735b1838b18b6432cb835fce1b9b08ff2d68e012bc50.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b67319d5978b2236bb8a735b1838b18b6432cb835fce1b9b08ff2d68e012bc50.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
remcos
RemoteHost
107.175.229.139:8087
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IZFV1M
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
b67319d5978b2236bb8a735b1838b18b6432cb835fce1b9b08ff2d68e012bc50.exe
-
Size
973KB
-
MD5
e2473c2832fb852d2aa8785e90b285a0
-
SHA1
663f5fd69dfd51e8608ea5e2231319923db26b1d
-
SHA256
b67319d5978b2236bb8a735b1838b18b6432cb835fce1b9b08ff2d68e012bc50
-
SHA512
4368f1289746e425eec96762e05894f524ef43424db92d66730c2eb8bfadffecb9126588da97a21f28273babba53bb94396a72e0a0abcf391c512adf8ae1efba
-
SSDEEP
24576:i9PtD/fmh3G6dGSCjFqHvwy8zfGIvtooo:UBt2GtFqPwGjr
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-