General
-
Target
Server_protected.exe
-
Size
2.8MB
-
Sample
240329-vgyaxade77
-
MD5
6c322fce42cecda6465e34424a2071d8
-
SHA1
b60d414f2a0047fc64066cb321e60149c91abfb3
-
SHA256
a83b02d1f55f1654d0b38aceb0efe068b62e2d19dcf625af3649bff0fda2b885
-
SHA512
f1e39bc9253e7ceefb21759e75a0352f65b454b55e5dc6adc098f5ba050fd1da879d8501eb054f920f8a37a0bf5a68c34394089c570af3b3ce12ad14e8bafb71
-
SSDEEP
49152:ZkpBXL0eovOeG1ahNMWlAUlYoZpwO6v3xOO5UuyYqFSMsyuRjguT3c5gDejqEVLV:ZkpBXLwKwN5pn4xOsNKFNjYxLcmFq0Y
Malware Config
Extracted
remcos
Hosting
outdoor-mailed.gl.at.ply.gg:13031
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
BrowsersDLLPackes.exe
-
copy_folder
Setup
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-FWVKXO
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
VFilesUpdates
-
screenshot_path
%WinDir%\System32
-
screenshot_time
10
-
startup_value
Windows UAC
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Server_protected.exe
-
Size
2.8MB
-
MD5
6c322fce42cecda6465e34424a2071d8
-
SHA1
b60d414f2a0047fc64066cb321e60149c91abfb3
-
SHA256
a83b02d1f55f1654d0b38aceb0efe068b62e2d19dcf625af3649bff0fda2b885
-
SHA512
f1e39bc9253e7ceefb21759e75a0352f65b454b55e5dc6adc098f5ba050fd1da879d8501eb054f920f8a37a0bf5a68c34394089c570af3b3ce12ad14e8bafb71
-
SSDEEP
49152:ZkpBXL0eovOeG1ahNMWlAUlYoZpwO6v3xOO5UuyYqFSMsyuRjguT3c5gDejqEVLV:ZkpBXLwKwN5pn4xOsNKFNjYxLcmFq0Y
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-