General
-
Target
Sprava0865.zip
-
Size
788KB
-
Sample
240829-mxlcaaxdmh
-
MD5
4dd783b22b05cec494d7443440b9380a
-
SHA1
796f2867bee960e1a60696fd9673622238cf6b41
-
SHA256
0973bf4ab963c2de6c69c3809ed228f0caf00409f4c09e78029640f2026dc19e
-
SHA512
5a08c5bd8d92284b93e849ce775a6bfd44a51f2374d182e036b64aa84d9e749e3c1f7a94555549745da34d433f7d136afb5d4bc41c4e8d9b0f5f66b6ba8267d9
-
SSDEEP
192:SzyEsYj3hX+Evuq+yZenc+3hXBE5IQyom3hX+UEgL9alyhFy63hXEIEyIzaGo:Kyyj4EW7y+r3ERyomEUEGkyhFuIExY
Static task
static1
Behavioral task
behavioral1
Sample
brt_1_0147.doc.lnk
Resource
win10-20240404-uk
Malware Config
Extracted
remcos
feetfuck
83.222.191.201:24251
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-XTJ1YO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
brt_1_0147.doc.lnk
-
Size
47KB
-
MD5
8b3dc64090b0b26eda4f1195f493160d
-
SHA1
bd0b4c1d9e8b84465714287727ba5293f9a8eb61
-
SHA256
cb43e05491b09d4c7da14d3f42d11a2bb4fa81b0fb47717d44c75426832cdf30
-
SHA512
ddbe1ad300d613531b6ffcb9a8ff607b1e6e7cf676ce738c31d138e6154ff0ee3c1b8d4d8b67c8fec5da444c845b62475736c228eb89d3b013a3ddcb15365deb
-
SSDEEP
48:88muavUQSbXTo87Cj3YMEDo/FoZaxCogDDo/LX7LdCZZGXu/dZZIa7x:88y8Nkgm3hX+UxCgLX7BuqQ
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-