General
-
Target
1a407d7c11c58235d559b6f378363840N.exe
-
Size
1.9MB
-
Sample
240906-lmzw9ayhjk
-
MD5
1a407d7c11c58235d559b6f378363840
-
SHA1
0b3dc1ec4d896473aae4670310d03c62da9aebd2
-
SHA256
fb67541dcd9e7b88464ad7484f62fae23db0021a07bd0aa0c18aec110af4a5dd
-
SHA512
65b0183a03d88f53d0b9151503ca59e7f841b9504cf586efe84591e3e750374b5ad1ac7d590e620841e134e7717da24ec263df904f5ac3d48bca4039ff663fe7
-
SSDEEP
49152:Hh+ZkldoPK1XalKCc9nueh+ZkldoPK1XalKCc9nui:w2cPK1ab32cPK1abi
Static task
static1
Behavioral task
behavioral1
Sample
1a407d7c11c58235d559b6f378363840N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1a407d7c11c58235d559b6f378363840N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
1.7 Pro
Host
213.208.129.213:137
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
srvs.exe
-
copy_folder
WindowsApp
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
WindowsApp
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_jpetmoenqu
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
srvs
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1a407d7c11c58235d559b6f378363840N.exe
-
Size
1.9MB
-
MD5
1a407d7c11c58235d559b6f378363840
-
SHA1
0b3dc1ec4d896473aae4670310d03c62da9aebd2
-
SHA256
fb67541dcd9e7b88464ad7484f62fae23db0021a07bd0aa0c18aec110af4a5dd
-
SHA512
65b0183a03d88f53d0b9151503ca59e7f841b9504cf586efe84591e3e750374b5ad1ac7d590e620841e134e7717da24ec263df904f5ac3d48bca4039ff663fe7
-
SSDEEP
49152:Hh+ZkldoPK1XalKCc9nueh+ZkldoPK1XalKCc9nui:w2cPK1ab32cPK1abi
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1