General
-
Target
d8e447308f00fa0042a153471d08390f_JaffaCakes118
-
Size
807KB
-
Sample
240910-x3274asble
-
MD5
d8e447308f00fa0042a153471d08390f
-
SHA1
017b7897fddd0d4178de41a21bcd9bb3e909e681
-
SHA256
94e8a6833f7e7c032ebf5d826f11876df763683aa55aa69a89fbfaef04937cfc
-
SHA512
633151c727dbf6f079d611f3281bd892705d016746630b04f9fb80428f14a735b27b548e6008474f0c3c75756c4f47131dd58e5bed31b36f5fa88ad103941fb6
-
SSDEEP
24576:7Vyfus2XDnARYKX5aei+zx7fyefXpkWSx6yYpG:7VyEURYKX5aV+xpf2WSIyY4
Static task
static1
Behavioral task
behavioral1
Sample
CHT International.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CHT International.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
3.0.2 Pro
RemoteHost
fgtrert.duckdns.org:8494
fgtrert.duckdns.orgqweerreww.duckdns.org:8494
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-VXX167
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Targets
-
-
Target
CHT International.exe
-
Size
850KB
-
MD5
f87e2aeb7bcbbb476a5d157602e47dca
-
SHA1
238f66f3053f2e154bf0a099aeab72698f6689e3
-
SHA256
848aee75718b5e635f13a64dcb64dd0c0d4d44228952d2941a9c4c1c14fd7ea1
-
SHA512
274b995615962f3ab52eacc6c393a76dc46aa431d109d450e37971548c0181d4ffbf048de6b2aad20aac82920f6aab425b2ce41887e1eb69e47ec28cc2798f47
-
SSDEEP
12288:EILpqyf4jsY/ipLmA0Hrx5ulDUyXzzq1CXvQaAQbiWzx51SwasKcZtlH0j2qDSvV:EIIyfws4FrnIvq0f5A4iWzx5nasRtpy
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-