General
-
Target
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
-
Size
947KB
-
Sample
240517-nptjcsfh84
-
MD5
23f0cf81aa7d1c7a4a23e95e5a2595e4
-
SHA1
0e477abeb86ae366d906a247e8f30b4ccdc02eef
-
SHA256
a135b28345728e0533bf4bdad442dfee04d2e6f67e9b04ebb088919ef18d6601
-
SHA512
208db7a72859d78a9b9ee235f78ae55b3fbc05fec9c475c5aaf66ffd50e4d9c16d58620473a21ffd0c19874b4906f9c0b7b1e77b6bd22f9cf87789ad3d4ab0e9
-
SSDEEP
24576:/YTyQ+R2J+E34ppWnRM/ggnlWWf5tlD7k:/pbkJqbMWBtN
Static task
static1
Behavioral task
behavioral1
Sample
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
remcos
FmGlobal
royaldachpharmacy.duckdns.org:6395
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
services.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GRT17F
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Customer Advisory - HS Code - Maersk Shipping.ppt.exe
-
Size
947KB
-
MD5
23f0cf81aa7d1c7a4a23e95e5a2595e4
-
SHA1
0e477abeb86ae366d906a247e8f30b4ccdc02eef
-
SHA256
a135b28345728e0533bf4bdad442dfee04d2e6f67e9b04ebb088919ef18d6601
-
SHA512
208db7a72859d78a9b9ee235f78ae55b3fbc05fec9c475c5aaf66ffd50e4d9c16d58620473a21ffd0c19874b4906f9c0b7b1e77b6bd22f9cf87789ad3d4ab0e9
-
SSDEEP
24576:/YTyQ+R2J+E34ppWnRM/ggnlWWf5tlD7k:/pbkJqbMWBtN
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-