General
-
Target
3ee7cd63e826153e5334bcad95e91de9054286c5503b78ad03febe50eca26853.hta
-
Size
114KB
-
Sample
240826-hxsn5s1enf
-
MD5
6c8ac4c656d98ff4280887b23258ecd6
-
SHA1
589a5b57c1046c73dbf880fb089efd11388cc529
-
SHA256
3ee7cd63e826153e5334bcad95e91de9054286c5503b78ad03febe50eca26853
-
SHA512
58db3dd717d2e0be19f1f73bda851f785df7cc04733c19ba98c575ef865b31e37ea56e6c71c1856e75e8b878a833124a8b96e5578ba83e6c8467edc508cbf949
-
SSDEEP
96:Ea+M7+yhfLMVeeyhftGMVxFX3At4FgRbOyhfUZyhf93hFMVJhyhf2AT:Ea+Q1hfBVhfZefhfHhfDhfVT
Static task
static1
Behavioral task
behavioral1
Sample
3ee7cd63e826153e5334bcad95e91de9054286c5503b78ad03febe50eca26853.hta
Resource
win7-20240729-en
Malware Config
Extracted
https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg
https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg
Extracted
remcos
zynova
cloudcare.duckdns.org:14645
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-J5EXI3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
3ee7cd63e826153e5334bcad95e91de9054286c5503b78ad03febe50eca26853.hta
-
Size
114KB
-
MD5
6c8ac4c656d98ff4280887b23258ecd6
-
SHA1
589a5b57c1046c73dbf880fb089efd11388cc529
-
SHA256
3ee7cd63e826153e5334bcad95e91de9054286c5503b78ad03febe50eca26853
-
SHA512
58db3dd717d2e0be19f1f73bda851f785df7cc04733c19ba98c575ef865b31e37ea56e6c71c1856e75e8b878a833124a8b96e5578ba83e6c8467edc508cbf949
-
SSDEEP
96:Ea+M7+yhfLMVeeyhftGMVxFX3At4FgRbOyhfUZyhf93hFMVJhyhf2AT:Ea+Q1hfBVhfZefhfHhfDhfVT
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-