General
-
Target
174d275e7cd95e50878e934ad3e7684dbbcc3ef7be79b6ba537bc3e99fdb0878
-
Size
139KB
-
Sample
240910-x2zqkssapc
-
MD5
77c7bc93cb86b97f26471b06d7668654
-
SHA1
8e20bf557703b30a4e4a23eda7db6393252a7252
-
SHA256
174d275e7cd95e50878e934ad3e7684dbbcc3ef7be79b6ba537bc3e99fdb0878
-
SHA512
190b4bb4c4a10de1806fb66a4510f9bddabef7f3d58b300f14318625014078308f0b01b0654ad0baa31adf740a00b28b856a2138735f93451e1c70bb85bb7c7f
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHc:xP6/M+WLckOBhVmIV
Static task
static1
Behavioral task
behavioral1
Sample
174d275e7cd95e50878e934ad3e7684dbbcc3ef7be79b6ba537bc3e99fdb0878.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
174d275e7cd95e50878e934ad3e7684dbbcc3ef7be79b6ba537bc3e99fdb0878.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
174d275e7cd95e50878e934ad3e7684dbbcc3ef7be79b6ba537bc3e99fdb0878
-
Size
139KB
-
MD5
77c7bc93cb86b97f26471b06d7668654
-
SHA1
8e20bf557703b30a4e4a23eda7db6393252a7252
-
SHA256
174d275e7cd95e50878e934ad3e7684dbbcc3ef7be79b6ba537bc3e99fdb0878
-
SHA512
190b4bb4c4a10de1806fb66a4510f9bddabef7f3d58b300f14318625014078308f0b01b0654ad0baa31adf740a00b28b856a2138735f93451e1c70bb85bb7c7f
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHc:xP6/M+WLckOBhVmIV
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-