General
-
Target
SecuriteInfo.com.Script.SNH-gen.32117.31795.exe
-
Size
515KB
-
Sample
240427-qlm9aabc45
-
MD5
3e1fb053e8ca0281a2952fbdced68d1e
-
SHA1
0af4262bd9b8b2ac335a27aac5211d6242d14884
-
SHA256
a964f632cb0e524f5f7784a1b99da4bbde98216128e74713eb12851b83073075
-
SHA512
498683b0aa74a335372810d25f6b4456264b3fff17536822ee24adbc560d5932601420c942e4a1dfbf800397c864300fffb14e89b620217321d857f6b0d40cf9
-
SSDEEP
12288:1fLwLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPLLLLLLLLLL2:1fLwLLLLLLLLLLLLLLLLLLLLLLLLLLL6
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Script.SNH-gen.32117.31795.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Script.SNH-gen.32117.31795.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
⠨/start.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
⠨/start.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
⠨/temp.bat
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
⠨/temp.bat
Resource
win10v2004-20240419-en
Malware Config
Extracted
remcos
RemoteHost
172.94.101.172:6238
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ZY6SQA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
SecuriteInfo.com.Script.SNH-gen.32117.31795.exe
-
Size
515KB
-
MD5
3e1fb053e8ca0281a2952fbdced68d1e
-
SHA1
0af4262bd9b8b2ac335a27aac5211d6242d14884
-
SHA256
a964f632cb0e524f5f7784a1b99da4bbde98216128e74713eb12851b83073075
-
SHA512
498683b0aa74a335372810d25f6b4456264b3fff17536822ee24adbc560d5932601420c942e4a1dfbf800397c864300fffb14e89b620217321d857f6b0d40cf9
-
SSDEEP
12288:1fLwLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPLLLLLLLLLL2:1fLwLLLLLLLLLLLLLLLLLLLLLLLLLLL6
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-
-
-
Target
⠨/start.vbs
-
Size
170B
-
MD5
65ee9f906fdefca9b4a6a21581dd849f
-
SHA1
b372dea5a9b9a99311445a55b634aa8f6c1d7b9d
-
SHA256
087f43e7f9f78bbeb1050cdbfaeb3d23ad7b4b742d6ef91229b8824a20daaee6
-
SHA512
1f593864f52ac61f7f4ef2aa1bfcf538dd2833e53bbd931f96c42b2ca90d2bf68545fdac547f0f3cce09ad7734acdb629bf642081227a996d3d22117263ad23a
Score1/10 -
-
-
Target
⠨/temp.bat
-
Size
518KB
-
MD5
2667b4a8172dd90357d7fb381b1bd5d2
-
SHA1
7e97cca9d3f29238ca92085405dd477d3323a6f0
-
SHA256
c8ac67ae12680fa0dbfe31a8c76793de12f3ef74f1c5e1f47785f7e5828dd364
-
SHA512
bdc8954bc23adfe40ce7cd21bb0ecc48a9ea94df170e5f22797c80aef8b5eceabf0d7d69f3d2e3f6d73b7aa77a5b5fef94113fb644394625f18b7d8968997013
-
SSDEEP
12288:JPK4iHnVY3v1mTxzxKElzjsatwSewkCTs2VKGv:81Y3v1mJYEzIa2LasO
Score1/10 -