General
-
Target
2024-04-10_a971ee83fd5ab858fdf78c12a58ce10a_magniber
-
Size
2.4MB
-
Sample
240410-1m56lacc94
-
MD5
a971ee83fd5ab858fdf78c12a58ce10a
-
SHA1
f93ca19e48410b0ab7ffd23b3797eae54f3b8cc5
-
SHA256
3ec3a0a4a46d34da0867cfd2dd6c93c95134367c92e4a3274857415b79453919
-
SHA512
57dd7cb1b04fda56f6b029a076eadbc127fbf0734313bedebde5d94ad2631fcce2a36ee394a4903bd8d9a0e21c41c3f7e5e997a9fcaefde7845cf06ef03532cb
-
SSDEEP
49152:aFP/rhbkzSYl+aFUUhf3LIE3VEaTMlWgqjEBay/uTKSACxVqrD7MsnLNvPiCtFvs:a1PoL33VEaTrdqay/W9
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_a971ee83fd5ab858fdf78c12a58ce10a_magniber.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-10_a971ee83fd5ab858fdf78c12a58ce10a_magniber.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
remcos
BENDECIDO
limpios.con-ip.com:1991
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9MWYZO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2024-04-10_a971ee83fd5ab858fdf78c12a58ce10a_magniber
-
Size
2.4MB
-
MD5
a971ee83fd5ab858fdf78c12a58ce10a
-
SHA1
f93ca19e48410b0ab7ffd23b3797eae54f3b8cc5
-
SHA256
3ec3a0a4a46d34da0867cfd2dd6c93c95134367c92e4a3274857415b79453919
-
SHA512
57dd7cb1b04fda56f6b029a076eadbc127fbf0734313bedebde5d94ad2631fcce2a36ee394a4903bd8d9a0e21c41c3f7e5e997a9fcaefde7845cf06ef03532cb
-
SSDEEP
49152:aFP/rhbkzSYl+aFUUhf3LIE3VEaTMlWgqjEBay/uTKSACxVqrD7MsnLNvPiCtFvs:a1PoL33VEaTrdqay/W9
Score10/10-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-