General
-
Target
339dcd1a52b9095623e72c678f20ed01.bin
-
Size
872KB
-
Sample
240829-bgzzysxfqr
-
MD5
3e0b84594043290d1802e1600a00f100
-
SHA1
1e0c72fe460102dad48c6869bf7de47536ccdc24
-
SHA256
7a59546ab79e0b1d73dca0d2dcfdeea4da848dbc33fb18f1c5c211759526362f
-
SHA512
200f56012fa9ce0ee5c1358cced21a6e1aeb316ac52f47bc10d5c7356b17ef8f0afebc5b8f26004b4caf6095b7161440cc535d5d824162a4bc9122566284669f
-
SSDEEP
24576:YhV/KsmfnAfiV7FQav1qkF6BMjmeoPpAhWELRepx:YhTsnAWQaatxmjLR+x
Static task
static1
Behavioral task
behavioral1
Sample
1414f1e42aa7b329d33ddbf9c64024eb822b1f61780bede84aa260724bd36b60.exe
Resource
win7-20240704-en
Malware Config
Extracted
remcos
BCV
tvq3101.sytes.net:1974
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9PFUGS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1414f1e42aa7b329d33ddbf9c64024eb822b1f61780bede84aa260724bd36b60.exe
-
Size
927KB
-
MD5
339dcd1a52b9095623e72c678f20ed01
-
SHA1
a2bd542dcddefc2ece12e47b380bc343ead31604
-
SHA256
1414f1e42aa7b329d33ddbf9c64024eb822b1f61780bede84aa260724bd36b60
-
SHA512
06b4ab19a5cd8957d879ed141e9d9ad5a0c4898d2bb460f4796d2d04014a67a10fe00bc6243a8936c8ec1b9be7d6cf4ce1a8a6c278067e6ea86ed5a2d40150a7
-
SSDEEP
24576:JBKlj3XZEwjwxSonfaM00VMNSfQ/woYhkToooZ:2ljHZncct7IoY9bZ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-