General
-
Target
test.vbs
-
Size
6KB
-
Sample
240409-jp4xwahh97
-
MD5
0fc0a184e324a6bbdc6c0cfec4d6e89e
-
SHA1
c82f6775029adf512d49c65cdf077de78fb568d1
-
SHA256
4d9aa4ac216e1c3ec1347fff4dbd6372302eec5e1adc2300b7b2e7fdf956d10a
-
SHA512
9b249ff20409a606c0697ef5823ca42477b33729e745006d347ffeea21f76322d2277d1a580a9e7cfd4ddeca6258108cad2908b99f59352a55ddd29133a20e00
-
SSDEEP
96:oQowGnBQUQUQUQUQUQUQUQUQU0mR51cLuIH3RveuXBQIww8fAiwGZ2ky:zLLuxDoiz2ky
Static task
static1
Behavioral task
behavioral1
Sample
test.vbs
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
test.vbs
Resource
win10v2004-20240319-en
Malware Config
Extracted
remcos
RemoteHost
flame.work.gd:3142
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6JSM3S
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
test.vbs
-
Size
6KB
-
MD5
0fc0a184e324a6bbdc6c0cfec4d6e89e
-
SHA1
c82f6775029adf512d49c65cdf077de78fb568d1
-
SHA256
4d9aa4ac216e1c3ec1347fff4dbd6372302eec5e1adc2300b7b2e7fdf956d10a
-
SHA512
9b249ff20409a606c0697ef5823ca42477b33729e745006d347ffeea21f76322d2277d1a580a9e7cfd4ddeca6258108cad2908b99f59352a55ddd29133a20e00
-
SSDEEP
96:oQowGnBQUQUQUQUQUQUQUQUQU0mR51cLuIH3RveuXBQIww8fAiwGZ2ky:zLLuxDoiz2ky
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-