General
-
Target
alta_inbound_20240208153739_3933_CC834DD.7z
-
Size
1.1MB
-
Sample
240209-qy43kadd36
-
MD5
ace8b8482747eaf4b82da5d30f1f7bda
-
SHA1
5e02f890921427ce4c3d32624d54acd81ff7fa9b
-
SHA256
ecc2f72b7d879b8065aa4e325a4ee922bf53dcfc1acf6517f9fc5c160986391f
-
SHA512
97bdde76970d5311795774640387e33043010357b5382712f5ca6004c1b2293c003af32a73e9c4b80a9657beef22418b1bf854e80310b71fda62da0a6bd4a90f
-
SSDEEP
24576:k1Fski6am/j9AY7iXW3R9KqMgLayWhBiYIk:k0Sa2A2iXAKfbyyUXk
Static task
static1
Behavioral task
behavioral1
Sample
alta_inbound_20240208153739_3933_CC834DD.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
alta_inbound_20240208153739_3933_CC834DD.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Malware Config
Extracted
remcos
Top
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
mqerms.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
alpwovnb-G3F5OR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
alta_inbound_20240208153739_3933_CC834DD.exe
-
Size
1.2MB
-
MD5
88469ec382b32cb4335ee8ac05e874c2
-
SHA1
a3d14f76d19eeb4c58ee0f77c6f2dfdc2d4aaaed
-
SHA256
dece3412eb180be708a4601d59471e9a5a89e0e914d9561f36e32334c44a47aa
-
SHA512
eeef92fac715582015ef2d4fefbcc012edd19cc4337f94180d689f42cee5d92b8bbef9ce7deda2503b43d62e5abe98afafd04c332f92d083ac38d8f9afa6e58c
-
SSDEEP
24576:nSOPcJoogMZ97gucdmZbrWY7qpwlBvgY+QLwEWnBWDI:JWoogMjyUW2qp0gJ3EG0DI
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
17ed1c86bd67e78ade4712be48a7d2bd
-
SHA1
1cc9fe86d6d6030b4dae45ecddce5907991c01a0
-
SHA256
bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
-
SHA512
0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
SSDEEP
192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+
Score3/10 -