General
-
Target
22042024_2009_22042024_RFQ 1Z8A6A658669149902.rar
-
Size
421KB
-
Sample
240422-pbwx1abc4t
-
MD5
9414e64ff5a96c9b9a478124a67a0f3e
-
SHA1
1130db8747e5c24160c79411e529b5a0209aca14
-
SHA256
fd8b1ef9b9742587d3b9052e0edbf463ee7891df57ec12196b92677b8ffa7629
-
SHA512
5faf9b01c35da6ebeb8fd7d5965f9ae63da09e4c329074c254947f55a125fe19e1d3df16392ba949a3b6f91dd344b9cd6c2857eca81b1a310f0a1a531291d2e9
-
SSDEEP
12288:AM7Oo+sxKpVZIzo5Hh1Fc7gs1CtysqFmd:97t+O+Hh1Fc7519sqFmd
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 1Z8A6A658669149902.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
RFQ 1Z8A6A658669149902.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
ravnemorens/Frsteinstanserne/Instantiations.ps1
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
ravnemorens/Frsteinstanserne/Instantiations.ps1
Resource
win10v2004-20240412-en
Malware Config
Extracted
remcos
RemoteHost
209.90.234.20:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YDAEDG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
RFQ 1Z8A6A658669149902.exe
-
Size
520KB
-
MD5
ef53493176b714d7c8c972a756cfd806
-
SHA1
c7c08850f9dd1706a2a2a5b456f5de2b25eb200c
-
SHA256
1353d2318463be28ebcffe36398b90b873ee21e2bde3d03f929103729c4b95ea
-
SHA512
eab8465a629001a43631724aaa9293c229286bebb33c943ce197ce5f17419b9b91c6f9be86c4dec68d4b099871abf3fa05807e99876ffa0ee3497f3a5abac2fa
-
SSDEEP
12288:fnPdhsFldr2BFS3Cr3HUNdAfZBAfYKBuyhleDJB:vPdhoeBYSrHU7K9KBuRJB
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
ravnemorens/Frsteinstanserne/Instantiations.Lil
-
Size
54KB
-
MD5
63d0c546b30964e943c2ac8fd5e236db
-
SHA1
7d46713cb1d3cbfe25efcaf24369fb067d310920
-
SHA256
eb26aa5b4ec7a1c0c0ad2be344c02a23f770815a40e84e5b1b5fe24c9b64edda
-
SHA512
91399fec920e3be9526e1af39a632512c6c00cea3566a9ce43fdbadf813c5b2b830620bfc381747b195a4e2c52b8ef4d81295b484ea6ed925979a97b8cf6a1ed
-
SSDEEP
768:stRSpMsDEBbiYzC9AUQg+Fj0VY6fgw8cl+ZzPhkrV439KaEJQkP5HF0GEFGRGI:uRUM0qbiCYYo3gnZzPKrOtKaiT8rE
Score8/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-