General
-
Target
4b0034a2e86bf558c75772bbeb8a538f1b3f6574227b5dbf8374eaa4046637c7.zip
-
Size
41.3MB
-
Sample
240815-bl13tawfqd
-
MD5
5c967cda0ba79bb41406b8c503817657
-
SHA1
97f1da7e60cee2e21e819c3f84f56dbba81ac522
-
SHA256
4b0034a2e86bf558c75772bbeb8a538f1b3f6574227b5dbf8374eaa4046637c7
-
SHA512
5efd2b88d5c771f23b7624da56aa7daaed301ce8bad236ac6108006ddf01049cd6bf18089917b688d397e9bfdc8c5abca30cd7ea83edbc86a67eeb6cdfaabb06
-
SSDEEP
786432:RNtA6KVqCBx1Ow1JAHRq/86q5KgkIVMRC1iJV9ieKfz8VTg694tb4/rdycVw3NcP:vtA64x1OwHTqh3M4sJV9iug6ub4AcVck
Static task
static1
Behavioral task
behavioral1
Sample
1099.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1099.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TAXORGANIZERpdf.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
TAXORGANIZERpdf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
msimg32.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
RemoteHost
privmerkt.com:6042
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-LKQWZ1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1099.e
-
Size
40.8MB
-
MD5
6ae1a9d8b283b8da4ec2d1fb01090d74
-
SHA1
a3d7592e8af160f5b233abe007e9b8c29b4d66bd
-
SHA256
1b8a78075bdac18361ffbe3b494b8095a4f64a2b95d18c5554bd588c84190621
-
SHA512
6a9b116ddb29af6017b54d8a103fa46d6d3ee2e63613dff146edb99b1287c1c61b7f0ec113a6e93e17c65bcef843a2a989eb5373bdc57298d0b0d6ca0b3d1519
-
SSDEEP
786432:U4Gbn+40bnZ4Ubnd4Ubnd4XbnT4mbnY4MbnR4UbnUEU9CGqb+:U4E+4aZ46d46d4LT4kY4iR46UEU9CGqC
Score3/10 -
-
-
Target
TAXORGANIZERpdf.exe
-
Size
1.7MB
-
MD5
30307b319b2451b6bf61d3e6b232f1da
-
SHA1
6a512848872be1325761e7ca110e0a1ee91cb0ef
-
SHA256
a7dbbad8a1cd038e5ab5b3c6b1b312774d808e4b0a2254e8039036972ac8881a
-
SHA512
7833ecb30a75324af6852e3583a609a653652f3cda9037ace7a1098ce7e52ed4b994c5ff1a0a0b4db748a01b06e8d4b8a10a50ebb9c0d4fbc8aa12dd1168f0b7
-
SSDEEP
24576:17AMY27PG+4VWz3zYxQ2IQKbvavAyoVVxPuOcabAC9fH6lJUkwJYaTTgKmfa8+:Nwj+4VWnoqSkHNckbfH6lJ2XgKmf+
Score10/10-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
msimg32.dll
-
Size
2.0MB
-
MD5
0053dea750b34089a1de8d10d18a9528
-
SHA1
e47bae9334a3cbeb1491756bb117e75882507bb6
-
SHA256
b670e59f539f07cfa6e43d69a9792f1fa38cf6dbdd92bca0db08511727e9308d
-
SHA512
cc1c2c8181a9604b93cafe7c255a1002454e90fa8c9bf5eb07be5868e331412895314c1e9ba970f8abf0f338aeb14b4211dbd18653e0e880dc9518a35da68c28
-
SSDEEP
49152:Mp1wTHyQhBCMsvEq0eBiDw0uJDHufr4/6B7uvRKtIe3/D92K6xZG5f+WFFynVsuf:01wTHF5svP7YDw0kwk2q
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-