General
-
Target
Medisterplses.exe
-
Size
417KB
-
Sample
240516-pxekvada61
-
MD5
ce9a01b0cb4fefdcf3e515c04eed116a
-
SHA1
b8ad340b679ba3e82d7ffc638338b9b3a2aea6c9
-
SHA256
bd7881bba1d222d41dffeed7e666f6c916886ad5841842064922deef45b67e87
-
SHA512
a31da8278c3fd4661ce4d7a5d971a21a8cb4f5983998bd6aa2a8e51abee6f491edfd97a4ed05dd340539714a28267f1f9cb35910b3ce3f30927ff03451f55f9b
-
SSDEEP
12288:FdY4AJBniIuil827YSeuie2OeSNu0ldZ4obxZm5g4:Fe4AJBniIVsSeuie7HPZZZ4
Static task
static1
Behavioral task
behavioral1
Sample
Medisterplses.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Medisterplses.exe
Resource
win11-20240426-en
Malware Config
Extracted
remcos
RemoteHost
185.202.173.179:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IQO6U9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Medisterplses.exe
-
Size
417KB
-
MD5
ce9a01b0cb4fefdcf3e515c04eed116a
-
SHA1
b8ad340b679ba3e82d7ffc638338b9b3a2aea6c9
-
SHA256
bd7881bba1d222d41dffeed7e666f6c916886ad5841842064922deef45b67e87
-
SHA512
a31da8278c3fd4661ce4d7a5d971a21a8cb4f5983998bd6aa2a8e51abee6f491edfd97a4ed05dd340539714a28267f1f9cb35910b3ce3f30927ff03451f55f9b
-
SSDEEP
12288:FdY4AJBniIuil827YSeuie2OeSNu0ldZ4obxZm5g4:Fe4AJBniIVsSeuie7HPZZZ4
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-