General
-
Target
45a09f316758fd79aafe72e9005096989484761a36063d05b7b20f214d3c0b85
-
Size
1.4MB
-
Sample
240408-p5sgnshf74
-
MD5
51d30ef65642af490373320582d1e2dd
-
SHA1
ae3a785010169746e5ad96886dfb1647e8b43365
-
SHA256
45a09f316758fd79aafe72e9005096989484761a36063d05b7b20f214d3c0b85
-
SHA512
44c54ca10fa06a624a92805a24044591f4ddcb97a2602ec70e6ad999722be5a56c34ca891131460e4b04ef360a8c05fd1dd2c2e9a1484b5a495ab8ce1fd2594c
-
SSDEEP
24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8aL4+LMGlGPPuqzSOa1WzJSH7A:NTvC/MTQYxsWR7aL7oOD1W0
Static task
static1
Behavioral task
behavioral1
Sample
45a09f316758fd79aafe72e9005096989484761a36063d05b7b20f214d3c0b85.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
45a09f316758fd79aafe72e9005096989484761a36063d05b7b20f214d3c0b85.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
remcos
RemoteHost
107.175.229.139:8087
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TLPQMO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
45a09f316758fd79aafe72e9005096989484761a36063d05b7b20f214d3c0b85
-
Size
1.4MB
-
MD5
51d30ef65642af490373320582d1e2dd
-
SHA1
ae3a785010169746e5ad96886dfb1647e8b43365
-
SHA256
45a09f316758fd79aafe72e9005096989484761a36063d05b7b20f214d3c0b85
-
SHA512
44c54ca10fa06a624a92805a24044591f4ddcb97a2602ec70e6ad999722be5a56c34ca891131460e4b04ef360a8c05fd1dd2c2e9a1484b5a495ab8ce1fd2594c
-
SSDEEP
24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8aL4+LMGlGPPuqzSOa1WzJSH7A:NTvC/MTQYxsWR7aL7oOD1W0
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-