General
-
Target
05092024_1425_05092024_INQUIRY#46789-SEPT24.gz
-
Size
233KB
-
Sample
240905-rrrz4atcmf
-
MD5
cbd36e3ed7e966d300cbd23326b1a94b
-
SHA1
d171086d109e785fe188cf18d5f862747529703a
-
SHA256
e84f4db6e71cfed342d3633636843eb4ee4f35510a77302a0d5fb60c41950755
-
SHA512
b17abd8f414d5843dde8cabb83433c86cee0f3058aa7e0db991b87d51016e80071ae37dd41b4e9fd6d2b9c62ebc4460368649dbc65e6477c44a0db2ebb2826a8
-
SSDEEP
6144:OmMgKKKq7dlR0XFECJFnu0jZrDY4vXraCEY4:OH7q5lGRm8Xn0
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY#46789-SEPT24.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INQUIRY#46789-SEPT24.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Extracted
remcos
AUG
64.188.18.85:4455
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
xlorers.exe
-
copy_folder
xlorers
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R2Z38E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
INQUIRY#46789-SEPT24.js
-
Size
598KB
-
MD5
c8b12fea7ec0d77f7eadb64361e5468a
-
SHA1
f519767ce53d69819384afc7d545f3c5940ae717
-
SHA256
337aa8b9b2cdaca9eae51830b6ccc6040339a93f3dd0f1946ffb0a697e4a9bb9
-
SHA512
9b52cb572f6fdbb1c66ac582e41d2ed8fef9130e311f9b8b2429197c6c0ba7ab3776c5ca2d3140aee6a74ec79d824b0d8410a7b3f4469cf6b07435a89d554542
-
SSDEEP
12288:SjoTUozZchVveIdNgwQrzQ6EFwg8VfEkNmDDjHO28gKMaNUeRWoTqLzBFdkVVM4X:QwJc8Fl2WI4T8LG
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-