General
-
Target
af085d32fcd03132b71cad68b7c3f25235d8b8740e46a85f63623e000c28221e.zip
-
Size
6.4MB
-
Sample
240316-3nj1vshc6z
-
MD5
e5fe6547379074f99de0ed9c379c12f1
-
SHA1
411ac5e4c75cbe668931526ff3c56dcec2f91967
-
SHA256
a3995c2893496fea18ece5e6c7263d9e56479f80ee7711c87bce861d79faa40f
-
SHA512
41eb0656c59c752732cfff9337a19e265f3f291dba2c44381db1eb2e86d256e2179bca9b9a895407363798dee59b58a5cf321fc696c4618b9c02083e09f81be0
-
SSDEEP
196608:m9cI+XVYelpt254506LQqGmpXwfnVm/T+mP83T:abA4450ogmkmqmIT
Static task
static1
Behavioral task
behavioral1
Sample
af085d32fcd03132b71cad68b7c3f25235d8b8740e46a85f63623e000c28221e.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
af085d32fcd03132b71cad68b7c3f25235d8b8740e46a85f63623e000c28221e.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
remcos
tutt0a
peleinufele.kozow.com:32024
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YRYWDT
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
af085d32fcd03132b71cad68b7c3f25235d8b8740e46a85f63623e000c28221e
-
Size
15.1MB
-
MD5
2f933f7527e61d37807589b9c7b5ae2b
-
SHA1
20e5bdb644b1c6e23ec02f2b21c863b8b5ab7ea6
-
SHA256
af085d32fcd03132b71cad68b7c3f25235d8b8740e46a85f63623e000c28221e
-
SHA512
1bc50117f43a1563b290f302ef19f0a3bd80775c751b32bc15c78e587e21cf440ffaa1e658939338bf95d68677f9ad1f075273c93b7ea7109299c0173f33d560
-
SSDEEP
196608:xB0ivGTAslgbSYBsnBho/wnBvq+4rMOblxz6qYFS1qY2aubxi58/EUxFFVs8pTwR:xBzvfaEog+4rdbUTFV3wOw
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-