General
-
Target
proof of payment.exe
-
Size
906KB
-
Sample
240503-nae3esdb2x
-
MD5
931254205cd64ad16b18fc9b318e2ca6
-
SHA1
4e5c18fcbf06212d952e084b1b455ecc136e4845
-
SHA256
05a341a2577c728e8a994775b17b8c5562539146d78a5de948e3534e1ae1c629
-
SHA512
d6464e122e6eb02d0d32dec6866555bcfe1b644382eda79b6242f93b39df70071a9eb92c66817e2c1cf2d0b7a7bdf09c12b52e21471e56b2bf4ac7c3745332d9
-
SSDEEP
12288:ppB778QH0fay4iJDieHNq5lVnsUc/Nb2JF5xXwGp94GEXHMY1E7LgHPPkqM7E6:bBWkithtq5jsT/9mb9PUsv7LMPZM7E6
Static task
static1
Behavioral task
behavioral1
Sample
proof of payment.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
proof of payment.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
remcos
RemoteHost
37.120.235.122:2269
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-F9KCYW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
proof of payment.exe
-
Size
906KB
-
MD5
931254205cd64ad16b18fc9b318e2ca6
-
SHA1
4e5c18fcbf06212d952e084b1b455ecc136e4845
-
SHA256
05a341a2577c728e8a994775b17b8c5562539146d78a5de948e3534e1ae1c629
-
SHA512
d6464e122e6eb02d0d32dec6866555bcfe1b644382eda79b6242f93b39df70071a9eb92c66817e2c1cf2d0b7a7bdf09c12b52e21471e56b2bf4ac7c3745332d9
-
SSDEEP
12288:ppB778QH0fay4iJDieHNq5lVnsUc/Nb2JF5xXwGp94GEXHMY1E7LgHPPkqM7E6:bBWkithtq5jsT/9mb9PUsv7LMPZM7E6
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-