General
-
Target
fd9c0fb6f463cee4975445c4ff19301daeed95a081f0428c5ef7aad815dd7277.exe
-
Size
993KB
-
Sample
240909-btrjcavern
-
MD5
d0da590b7edbc0da19fb22989e74094a
-
SHA1
96ebe02b6e7499acdf741aa1a770511345532cf3
-
SHA256
fd9c0fb6f463cee4975445c4ff19301daeed95a081f0428c5ef7aad815dd7277
-
SHA512
6f7547230d5e005b6a9f04db0cb0c64c501dacf6f4836b1061f6dc2135ab8a06f06a1c5d7f90bd87491b534e4bfc20068d498b55bf896d63058ec8035df03a9b
-
SSDEEP
24576:SUobyDHF8HpzkLmV4ZDeLnmx/E/oLZT2nGr4oI6:DZKJILmVmeKx8gZlI
Static task
static1
Behavioral task
behavioral1
Sample
fd9c0fb6f463cee4975445c4ff19301daeed95a081f0428c5ef7aad815dd7277.exe
Resource
win7-20240903-en
Malware Config
Extracted
remcos
udu
UDUM.WORK.GD:2431
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
sos
-
mouse_option
false
-
mutex
udm-2WYU92
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
fd9c0fb6f463cee4975445c4ff19301daeed95a081f0428c5ef7aad815dd7277.exe
-
Size
993KB
-
MD5
d0da590b7edbc0da19fb22989e74094a
-
SHA1
96ebe02b6e7499acdf741aa1a770511345532cf3
-
SHA256
fd9c0fb6f463cee4975445c4ff19301daeed95a081f0428c5ef7aad815dd7277
-
SHA512
6f7547230d5e005b6a9f04db0cb0c64c501dacf6f4836b1061f6dc2135ab8a06f06a1c5d7f90bd87491b534e4bfc20068d498b55bf896d63058ec8035df03a9b
-
SSDEEP
24576:SUobyDHF8HpzkLmV4ZDeLnmx/E/oLZT2nGr4oI6:DZKJILmVmeKx8gZlI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-