General
-
Target
4b487f91d2504883b4c9df18848af5ef.bin
-
Size
891KB
-
Sample
240831-bqa27axdma
-
MD5
779559ac3b1cbd82a2b01991f87a8f08
-
SHA1
3da3da722808a6fd4929b1ed73482e8075e77c62
-
SHA256
c3bd1eaa3e042bd0948cfdec06cae89031e5437f14ecc65e4a449a44e7c296ed
-
SHA512
0a369ec43b58745027435478b76ef9c2d867d0eb668034e525100e26ec2a92c2ce0c347b2e2d35fe4061aca30a9557fa2bf318aee49e7907ea05c77be964f319
-
SSDEEP
24576:vnJmajG4w+3U/fokFcsFKzo3PaqQM0NIUk75IYX:PgP0U/Ln+o3PF+E5IYX
Static task
static1
Behavioral task
behavioral1
Sample
f34fd6a0b6536f074e3a1bc41f0e35a80667688de9668cd1d75f6920a06e7607.exe
Resource
win7-20240705-en
Malware Config
Extracted
remcos
H�texte
rodri.selfip.net:50019
racindjah.blogdns.com:50066
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
journaux.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-B6J50C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Captures décran
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
f34fd6a0b6536f074e3a1bc41f0e35a80667688de9668cd1d75f6920a06e7607.exe
-
Size
970KB
-
MD5
4b487f91d2504883b4c9df18848af5ef
-
SHA1
964e913b8b4cba2232e46b3fe0b73b1c009bed7d
-
SHA256
f34fd6a0b6536f074e3a1bc41f0e35a80667688de9668cd1d75f6920a06e7607
-
SHA512
2f38dfa36bff6235dcddb359af65e3374f556e40fd950c6e5e9b52a474d46227d833fd9897efc925b781f6b97b093b29dc9d119edc88d76a23d3407a1471e23b
-
SSDEEP
24576:BYx8QzPlMGKwlyvxR27CYOlOLkgggD8lyftUCp2mv:6x8QzZYvxR2WbRggp0XT
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1