General
-
Target
04092024141304092024PO720.rar
-
Size
862KB
-
Sample
240904-svbyqashkr
-
MD5
429c322c96fa508222d3adb934abc5f0
-
SHA1
d71a1bed2731ceb41e6bda0b32e96b74ab944b2b
-
SHA256
9a15bd4f82adcc32d13fb16af0bd33c4d3d028895c93f4ec2cc995d9ad5f2d01
-
SHA512
4f072bb544ac02749dd1da6500394b986a9d4db3f4b05467cb759b6a7e4ce9237aa251518530ff9b7a74cfbd54176d36f19c6800a794877e763f0ea43d60f28c
-
SSDEEP
24576:TeorZkcXNWj/8ZLyFx6wB/ncCF6Ef20DQ2bCVrLRZQd:TZsLFx6wKCdhDCVrLRZQd
Static task
static1
Behavioral task
behavioral1
Sample
PO#720.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO#720.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
throttle_8967
154.216.18.217:8967
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4SV4HO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO#720.exe
-
Size
914KB
-
MD5
57c246dd2b2221edbfd54ff9246a0099
-
SHA1
3e4dc6e19407ff041b25629082a90382be7b957f
-
SHA256
6fb1afbb72d328bdaca9c019107c5ce12c81bfbabac1f1b7426db29ffec79f96
-
SHA512
5a49e14dfaa8b6f53bc9e5da299f43d199389ded897c9a23ec6615c396bc83e6589787f0704fa097c395296d643fd0b6b3e83dbdddad385d2ee5af5825cea9e2
-
SSDEEP
24576:+Eb5NCjPBS2nv0frerFWM+u848EUjooYgyUKHdw:N5N+5S2nv0fKxIuRUjoSK
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-