General
-
Target
e1cb41543e7c1f4fb4809f85e8c2e95b8e8cfdfe1c10cabdfdf66d0f6833d24b.exe
-
Size
80KB
-
Sample
240319-dg2vnafg64
-
MD5
f7c281ad8f95308eda627147f019d7be
-
SHA1
bb95cc4d23e676f2bab42dfdae9c6c99d7387790
-
SHA256
e1cb41543e7c1f4fb4809f85e8c2e95b8e8cfdfe1c10cabdfdf66d0f6833d24b
-
SHA512
d4eb6aa6b43b7059c7161987c788a94771feb45c26298562998f99dc045b7008e7b29f0aad87a9793996da41310eeca7fb6bb4825dc8a88f234e728ccf6df88a
-
SSDEEP
768:afHUka4Sj0D+Fc0Q3m3CJV1jpugzPbPhcO35Rls9uQjr:ws4Sj0D+Fc0Q3m30Vxpug3d57s9Pjr
Static task
static1
Behavioral task
behavioral1
Sample
e1cb41543e7c1f4fb4809f85e8c2e95b8e8cfdfe1c10cabdfdf66d0f6833d24b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1cb41543e7c1f4fb4809f85e8c2e95b8e8cfdfe1c10cabdfdf66d0f6833d24b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
remcos
ME
66.63.162.155:1608
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
V.systems.exe
-
copy_folder
V.systems
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-N3SAL0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
e1cb41543e7c1f4fb4809f85e8c2e95b8e8cfdfe1c10cabdfdf66d0f6833d24b.exe
-
Size
80KB
-
MD5
f7c281ad8f95308eda627147f019d7be
-
SHA1
bb95cc4d23e676f2bab42dfdae9c6c99d7387790
-
SHA256
e1cb41543e7c1f4fb4809f85e8c2e95b8e8cfdfe1c10cabdfdf66d0f6833d24b
-
SHA512
d4eb6aa6b43b7059c7161987c788a94771feb45c26298562998f99dc045b7008e7b29f0aad87a9793996da41310eeca7fb6bb4825dc8a88f234e728ccf6df88a
-
SSDEEP
768:afHUka4Sj0D+Fc0Q3m3CJV1jpugzPbPhcO35Rls9uQjr:ws4Sj0D+Fc0Q3m30Vxpug3d57s9Pjr
Score10/10-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
-
Detects executables built or packed with MPress PE compressor
-
Detects executables packed with or use KoiVM
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-