General
-
Target
833d78a7e52cbcc21bf4a6843b7ed4130b2d39ae18896370324a7203a705025d.exe
-
Size
483KB
-
Sample
240822-l9whcathlm
-
MD5
148795d6cfcff607f38bd3815a65a7b6
-
SHA1
a0e7f849720140d61d0bfecffb835fb467ae9faa
-
SHA256
833d78a7e52cbcc21bf4a6843b7ed4130b2d39ae18896370324a7203a705025d
-
SHA512
4e97c7ba04c0b61a1dc3dd0801364048527685b0d2df0e65cdb00670a8a73785d9386e92b51668c54ba6608daaf4f9d29749646fea4a751a9a6def74697c474e
-
SSDEEP
6144:wTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccrOT4:wTlrYw1RUh3NFn+N5WfIQIjbs/ZBFT4
Behavioral task
behavioral1
Sample
833d78a7e52cbcc21bf4a6843b7ed4130b2d39ae18896370324a7203a705025d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
833d78a7e52cbcc21bf4a6843b7ed4130b2d39ae18896370324a7203a705025d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
VIBRATE
iwarsut775laudrye2.duckdns.org:57484
iwarsut775laudrye2.duckdns.org:57483
iwarsut775laudrye3.duckdns.org:57484
hjnourt38haoust1.duckdns.org:57484
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
sfvnspt.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
shietgtst-MYQW4A
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
833d78a7e52cbcc21bf4a6843b7ed4130b2d39ae18896370324a7203a705025d.exe
-
Size
483KB
-
MD5
148795d6cfcff607f38bd3815a65a7b6
-
SHA1
a0e7f849720140d61d0bfecffb835fb467ae9faa
-
SHA256
833d78a7e52cbcc21bf4a6843b7ed4130b2d39ae18896370324a7203a705025d
-
SHA512
4e97c7ba04c0b61a1dc3dd0801364048527685b0d2df0e65cdb00670a8a73785d9386e92b51668c54ba6608daaf4f9d29749646fea4a751a9a6def74697c474e
-
SSDEEP
6144:wTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccrOT4:wTlrYw1RUh3NFn+N5WfIQIjbs/ZBFT4
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-