General
-
Target
dbac614bdf786dd5741aaab9ea8006d7.bin
-
Size
850KB
-
Sample
240214-d7ah4afh6t
-
MD5
6038f71848a9058a1e96d0d711a5026c
-
SHA1
fd861cfb85002583d23283861b877c5920c459c9
-
SHA256
2cbdaf22b808c1094ce3d8b671444a7a08cff78d65e67170ceab0b2cda1f1423
-
SHA512
f7d379d2047c03a75c511e40abb0f3e4c03b6f1c8bbfaac0b90e350149c6ebdd58e8b40449d9770990e8a105c4355e12f7b7e65826b9aed9d098de973ab0b031
-
SSDEEP
24576:5+akEP9H3kPuvzOnQ8KVtxppByE3NlFD0AoxTTeN:5+akEP90jXitxnByE3N7RKTC
Static task
static1
Behavioral task
behavioral1
Sample
36bd481c4fa0c81766a46d47dc47bd538c2bbf91254092fe6f5cbea1d3bcb4d2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36bd481c4fa0c81766a46d47dc47bd538c2bbf91254092fe6f5cbea1d3bcb4d2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
remcos
Top
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
mqerms.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
alpwovnb-G3F5OR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
36bd481c4fa0c81766a46d47dc47bd538c2bbf91254092fe6f5cbea1d3bcb4d2.exe
-
Size
1.1MB
-
MD5
dbac614bdf786dd5741aaab9ea8006d7
-
SHA1
4f49b045fe3b043d5f8541939ef66d611094b10d
-
SHA256
36bd481c4fa0c81766a46d47dc47bd538c2bbf91254092fe6f5cbea1d3bcb4d2
-
SHA512
966a2038cb16dead59f3b44379d8fb2bb35f5888b10c74cafb8a28b8e9a029b0a5ec0d3c7d17a5915351014c7307e3989efb17120781dccbf7815a00d5789526
-
SSDEEP
24576:KS5HuM8IqoMzMxDHEHsGhXwy54j3BjqgMQUWhypBR:f55XOHsG/54j3ZftUNBR
Score10/10-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
17ed1c86bd67e78ade4712be48a7d2bd
-
SHA1
1cc9fe86d6d6030b4dae45ecddce5907991c01a0
-
SHA256
bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
-
SHA512
0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
SSDEEP
192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+
Score3/10 -