Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
entryofkingboraisreallygreatandeverythinggreattounderstandkingkobraisthekingofsnakeanditshaingthebeautiuflwaytoundertand___kingofkobrakingof.doc
-
Size
34KB
-
Sample
240531-jpctdsce92
-
MD5
754bde2b5da33419817a557609fa13c0
-
SHA1
1b38e6bb5186219990a47b01127084570fd3c2b6
-
SHA256
db6ce8f173b65bf134fe41be191b3d9317edc64c08a1ae28dd90138e57a7b94f
-
SHA512
64f9a09a523013fb61bafdc5be39e1ba6755127e5f7c30a61baf66826f721a4db30847cb91dceecc8322fd0004164c712ab024c34040a78b0910b595c2142df0
-
SSDEEP
384:4/BhTa2+AQWJjIyTo/X00sUSXokRSWGv+P+cPQ8IOdy0sE06QGq3lG+:4/Br7jjIyTUX00sUye+2cPXj9QGqR
Static task
static1
Behavioral task
behavioral1
Sample
entryofkingboraisreallygreatandeverythinggreattounderstandkingkobraisthekingofsnakeanditshaingthebea.rtf
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
entryofkingboraisreallygreatandeverythinggreattounderstandkingkobraisthekingofsnakeanditshaingthebea.rtf
Resource
win10v2004-20240508-en
Malware Config
Extracted
remcos
Fresh
manxzas12.duckdns.org:14646
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-21CR3E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
entryofkingboraisreallygreatandeverythinggreattounderstandkingkobraisthekingofsnakeanditshaingthebeautiuflwaytoundertand___kingofkobrakingof.doc
-
Size
34KB
-
MD5
754bde2b5da33419817a557609fa13c0
-
SHA1
1b38e6bb5186219990a47b01127084570fd3c2b6
-
SHA256
db6ce8f173b65bf134fe41be191b3d9317edc64c08a1ae28dd90138e57a7b94f
-
SHA512
64f9a09a523013fb61bafdc5be39e1ba6755127e5f7c30a61baf66826f721a4db30847cb91dceecc8322fd0004164c712ab024c34040a78b0910b595c2142df0
-
SSDEEP
384:4/BhTa2+AQWJjIyTo/X00sUSXokRSWGv+P+cPQ8IOdy0sE06QGq3lG+:4/Br7jjIyTUX00sUye+2cPXj9QGqR
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Blocklisted process makes network request
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-