General
-
Target
rfq1960.gz
-
Size
879KB
-
Sample
240723-nlldkstbqe
-
MD5
0bf562ca1a78c3aa86732e50fb0c36a3
-
SHA1
892fd1168cc1267a9823fa9839d5fdefc2700cbc
-
SHA256
cd231d9c643a1c98120aad79446370a039cfc5483fcceaeedf80b7a933de8758
-
SHA512
49cbcf99178ce26de9ef0c69b95f0c2a741a774f00c2208b2fd177589b75274b506822c178265f1998eb4c69e8055bef52d3b2291e0f99e4319f92745e600502
-
SSDEEP
12288:5rJM0NSo9Ch3BztmE9TZQcvLIQ7LbvPk9tx84zihaoJlDItMdP72nW+eXJDlYEdT:xJM0kCCh3BhvKcvLfLkdNSJ5YnwZ4Rg
Static task
static1
Behavioral task
behavioral1
Sample
rfq1960.exe
Resource
win7-20240705-en
Malware Config
Extracted
remcos
5764576
172.93.218.178:45667
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
765-XJJE0J
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
rfq1960.exe
-
Size
904KB
-
MD5
38b63c968b2733cef310a6df2dcfa478
-
SHA1
bbbb4dcf4ecc6364af54480929d430da1c460a13
-
SHA256
2768689f6c4a60b7fe18d6c87fdecd8a7f8dceefa298a5851c4a7c6909f3a92d
-
SHA512
ab9486482bfae4c5a86a5d3dbe9aa47b003d9d74965b5fbd24f72a30ee1bd5a34a75cbcecff98aa3852e7c2019a582f8633bc1c8d762a65ef9084fb00791f3da
-
SSDEEP
24576:CRv6SSp2ReQ/tOsbwHsIS7NjkDpGrWbv8MXK:CJZeQcsUHPSZjkDpcWb3
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-