General
-
Target
91fb1c64166906768693224b123211e7f6aaaab6c4bfd831708eb8844eb9ecde
-
Size
849KB
-
Sample
240417-qgq5daad8s
-
MD5
4b2e2848f5c39fdd539c79df2bd85bc3
-
SHA1
332d154174793313c5b0efd3e06030a5699a4014
-
SHA256
91fb1c64166906768693224b123211e7f6aaaab6c4bfd831708eb8844eb9ecde
-
SHA512
06ef888ee858739cc99304fb8d0672855133bd0052acf3161c7b5f6ef5cdb08940c2fbfcd726e5aa65771ac87a36e3ad29505560c9ebc1a2beb223a446a86e38
-
SSDEEP
24576:Y7vwnzbA6hYUo/mKrSqbztEe6kh8hiXg2z1s/EYZJwq:Yz6zb1hYUxKrpyGpg2z6/VR
Static task
static1
Behavioral task
behavioral1
Sample
98b668f7457089866b6364c672e8dd35b12a24899eb80fdfcfc2a5aab8d9aa5b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
98b668f7457089866b6364c672e8dd35b12a24899eb80fdfcfc2a5aab8d9aa5b.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
remcos
JONS
172.245.208.13:4445
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R7QS5C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
98b668f7457089866b6364c672e8dd35b12a24899eb80fdfcfc2a5aab8d9aa5b.exe
-
Size
926KB
-
MD5
a5116c0a496d4b011dd2afc12147d1b2
-
SHA1
967e37264a5e0982b21b267211f9c5ccdc1662cf
-
SHA256
98b668f7457089866b6364c672e8dd35b12a24899eb80fdfcfc2a5aab8d9aa5b
-
SHA512
1d1922b3cbd0bc2e3e85ce0e787f63819a8f0a76286f58d590fecc3d5753cf78fe17ce3ecf8253117189a8f994e4b7b167aca394721bf3f1acd708f2702ffe87
-
SSDEEP
24576:8cKhi13lO4V99LzjUdKc7dJ3iPOgrNiFj2+:NKE1hLzjA7Z8Piz
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-