General
-
Target
2baa36ebea1ad309fa1083845b0510d4ea439bd52463c67dc1376a722c2e9fbb.zip
-
Size
3.4MB
-
Sample
240519-kr5gvsbb53
-
MD5
5045c15ea6e597ebbbbec352426ec9b5
-
SHA1
e6835a661da772b16f265d4a7542d9c2fcee1b9a
-
SHA256
2baa36ebea1ad309fa1083845b0510d4ea439bd52463c67dc1376a722c2e9fbb
-
SHA512
776c396efbd1cd8ada525c22b77cdb3a22162fad5e48ff1ea5ed6e8958e701f42fd4b2780f0974a8522aeb61697f4446a8d3fbbc1738f4c6c2b2327ba5629668
-
SSDEEP
98304:i9Uds+n3aPDmuLBEtoVXSJ/j2+yMSTJUkeFnf0X:EUxn3aPyu9LSgbMST7sf0X
Static task
static1
Behavioral task
behavioral1
Sample
CodeBlock-wallet_v1.3.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CodeBlock-wallet_v1.3.1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
devobj.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
lmhsvc.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
tzsyncres.dll
Resource
win10v2004-20240508-en
Malware Config
Extracted
remcos
22077
195.54.170.36:22077
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
VB786YNr-ICKPAO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
CodeBlock-wallet_v1.3.1.exe
-
Size
99.4MB
-
MD5
51214f407f63fa8b44b168e7fb1af2a4
-
SHA1
5d253f197114361a2f80ca0d0e2fed6834c97b2b
-
SHA256
0afab6861707ce6ad25f50fdf52af8dc3e637ba4c0fac93443fe073274cdc742
-
SHA512
e891b1eeb33b0f8a80af771bb0caea27f8e1e586277ed030e5091380a3933cb81a34b8fde1eade0db993f9dd661bee7f72fd6c2f7fe5fa2590c4530250513ca7
-
SSDEEP
49152:4WGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbG3335:MtLutqgwh4NYxtJpkxhGx333
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
devobj.dll
-
Size
191KB
-
MD5
769767031cd8654f4fde2735f22f24cf
-
SHA1
a03034843d2129af2e402299eb644b89d818c852
-
SHA256
7733dead6be48945e9c711432208e4f3ee102453ea43ecf6f4bd4a1ad95961f5
-
SHA512
5148a9d0f496bc02b1f38d5fbc628a0cfa2529716afcec0552094c5dbed4c343082c9ea876eede8055140a47f5364b3fb6a97c1388b16086c94dc6f216fd1655
-
SSDEEP
3072:iiKoypHRG+dZGXxE9TnFgmlkmi+U0BItk5sVE5qDTHq:iiKzsyZGXx47Fgml5l4k1z
Score1/10 -
-
-
Target
lmhsvc.dll
-
Size
25KB
-
MD5
4a501e9429650b678610abccad1d2609
-
SHA1
c582b10add7d6beda6ca3e312c90edb09bc9f1ad
-
SHA256
71f33fd997d36b8cfb7fd36397cb768aef1b6329b3882d445b72246621f3bd7e
-
SHA512
542c299b1b52555ed98558b5cdf967a4803445c0475e5ea0982d5618d9d9a681aaca8589f7e3a20b8e4c0ab8843b2542db4d285f12b7f9b96590338a09541ae5
-
SSDEEP
384:ZjeVCW7IDHFlIkTwxUFFIlD+YVMFPPqxagOzpW1lG3rgpoNOWW+W:urqokIlDl4neagO1U+0pim
Score1/10 -
-
-
Target
tzsyncres.dll
-
Size
4KB
-
MD5
d8dd76c289443abdd5835d32b9c1028a
-
SHA1
aa6abfce548c3ab2f1674755205ea9b8e16d96cb
-
SHA256
366905e144e8e19b6d73719c189c9b37222b5e2646e6cf295f6fd8456a899701
-
SHA512
ad5b453ccc2d2f9559a51b2dbeac66b0b64ca0b71eb28f0420a7fd638495fb58c6730de3dac262a11efe3179032187923cbdc432c9a58a0dd9c6e327af039cc9
Score1/10 -