General
-
Target
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
-
Size
1.4MB
-
Sample
240406-bneycsgc9x
-
MD5
8ecf2c490c81dfc195a95d51033f2e55
-
SHA1
555dcc02731ea5df031260a9f94141a6e8301b17
-
SHA256
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e
-
SHA512
8431bd38f923d05db9acbaa4b79ed88a5f5c625bf3df2380c072fad5aa7fbdc714ab08eccb46cda50b1da4117684a05a795bcc51d9629499f637b1a927a3595b
-
SSDEEP
24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8aDSMUB220ZTSVspjHPYnczgFh8OhdQcK:ITvC/MTQYxsWR7aDSjB2hTSu5WLr8OvT
Static task
static1
Behavioral task
behavioral1
Sample
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
remcos
RemoteHost
193.222.96.75:8823
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TNRDZX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
-
Size
1.4MB
-
MD5
8ecf2c490c81dfc195a95d51033f2e55
-
SHA1
555dcc02731ea5df031260a9f94141a6e8301b17
-
SHA256
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e
-
SHA512
8431bd38f923d05db9acbaa4b79ed88a5f5c625bf3df2380c072fad5aa7fbdc714ab08eccb46cda50b1da4117684a05a795bcc51d9629499f637b1a927a3595b
-
SSDEEP
24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8aDSMUB220ZTSVspjHPYnczgFh8OhdQcK:ITvC/MTQYxsWR7aDSjB2hTSu5WLr8OvT
Score10/10-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-