General
-
Target
20082024_1400_19082024_Quotatio19082024.rar
-
Size
546KB
-
Sample
240820-ra4ybsvhkd
-
MD5
dc40f4bdcd026d95f46e26bfbe7936aa
-
SHA1
156041c3a723b2268103892f07495fd032d4f6ce
-
SHA256
3365e779f6bb5037404b967bb9dd5651bbbeb32f7f2ea4c63ca21acea0f7b697
-
SHA512
414cf6ee28a9527947e02bbc29a3ecfbf9099fc4e3e1d2f4816ece15f6be83abb1c21191cbba2b272cefad1b58ac1446a312f040c3dd0e55afea96b187bbcb38
-
SSDEEP
12288:i36eZLk13oCXsoA+aqfxClnHo0wnizE46g8551Fa6aNqGGX:UDZLk1Zso5a4nyEd+DsGGX
Static task
static1
Behavioral task
behavioral1
Sample
Quotatio19082024.exe
Resource
win7-20240705-en
Malware Config
Extracted
remcos
Ready
freak4u.duckdns.org:22891
freak4u.duckdns.org:22892
hgbourst28lasor2.duckdns.org:22891
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
lmzoiuts.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
alsmoritstf-T1OUDN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Quotatio19082024.exe
-
Size
568KB
-
MD5
91dd6ee8e62b032c8264b3b55e69eddb
-
SHA1
f2688c3f49fec062e9ad7a2dec3571cd668aa879
-
SHA256
895417f8fd168a02d71365994d4e4500cdbf31af01be6ce8998fc38a342cac2e
-
SHA512
194bb6a4314d9815851373b9559cc52b9d2712988d44e06db8ece1c9d45b98e41c15d51984e6ed4182adb17eedd278dd47cda9e42c01a3efc941fdfd0c3400e7
-
SSDEEP
12288:5T54bavS+gjBubIHBR5h2rZgS+0cWz198PCg7XwoCaz:5T54OK+A/Bl2rZEW59hg7X7Lz
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-