General
-
Target
SHP_01992336.vbs
-
Size
219KB
-
Sample
240719-mbdqbazaph
-
MD5
7551bcf735cd51d7e003ea42f3c9bc2f
-
SHA1
2dbef22e293013eaaf85db350a131e32db25b581
-
SHA256
e6e8a9afd766ad37eb26f95a91ce4f85183ec483242d86845e87c5bdaeec9f0d
-
SHA512
a3ea9816176bcfc83fee3de582f8d2a22a15a926fa46ddc1675ab98d7fd99028bebe9812a94dbc0ec583cf9fded21ccf99230d146e9e467006306ca8feddf9f3
-
SSDEEP
6144:3iF3KsfKvQXzfT1gSynnJLeZy+xu6FQtZ:yF3Ks6QDfT1gTnnJLeZdU6sZ
Static task
static1
Behavioral task
behavioral1
Sample
SHP_01992336.vbs
Resource
win7-20240704-en
Malware Config
Extracted
remcos
zynova
2024remcmon.duckdns.org:14645
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R2I0JW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
SHP_01992336.vbs
-
Size
219KB
-
MD5
7551bcf735cd51d7e003ea42f3c9bc2f
-
SHA1
2dbef22e293013eaaf85db350a131e32db25b581
-
SHA256
e6e8a9afd766ad37eb26f95a91ce4f85183ec483242d86845e87c5bdaeec9f0d
-
SHA512
a3ea9816176bcfc83fee3de582f8d2a22a15a926fa46ddc1675ab98d7fd99028bebe9812a94dbc0ec583cf9fded21ccf99230d146e9e467006306ca8feddf9f3
-
SSDEEP
6144:3iF3KsfKvQXzfT1gSynnJLeZy+xu6FQtZ:yF3Ks6QDfT1gTnnJLeZdU6sZ
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-