General
-
Target
RFQ SY103 first order 2024.zip
-
Size
898KB
-
Sample
240405-c21mnaaf73
-
MD5
a7937ff9e9af842c4034fd5165aaacdc
-
SHA1
8a9f5c313086439f220a81328bd823d94f849584
-
SHA256
80a68cc0e6e5bdcc19c94d6824cddd8d1c45d55090ea48f29554c67495991f5b
-
SHA512
a21ca513da96abe3cde657b8da8932d0c0d1ce8a781e27a3aff6f61a853bdd23d8596cc5b739060207dd914d8247428d8967e950c133b8676e52eae30415c43d
-
SSDEEP
24576:b7Z7Huj2ps4yZBcT3Vk1rDgZ+hvIR5LqenMf6rqg:bdHuCpByZBYwDgZ+hvIRI8MfIqg
Static task
static1
Behavioral task
behavioral1
Sample
RFQ SY103 first order 2024.scr
Resource
win7-20240221-en
Malware Config
Extracted
remcos
BUDDY
192.210.201.57:52499
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-LMLI87
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ SY103 first order 2024.scr
-
Size
966KB
-
MD5
9beaec299e48eb0072fd6e270d8e8cd3
-
SHA1
a719b69d48a210af3749bccd27b4ad5185c35d8d
-
SHA256
554b40336bad24df88cbde544cdf20d553d02ce7fee5dab9a82318d7c21471e0
-
SHA512
d0742bee412db3abdb8ddee99ceaf45721f6c72c2b9044838d755b6e8a51377831177eb087f709efee31dc36871e2e274338734731e3d89519bebfb1e74c0733
-
SSDEEP
24576:dtHKWYHu2k6ei445zcNjNGbr3SN2jcjR11O7Akmla:7KWYHu2kf745zCa3SN2jcjRuUkK
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-