General
-
Target
4e0fc15a0517d679c24f6ab482f1654f29bb736bb028c8c119358d3dfa64a414.zip
-
Size
4KB
-
Sample
240911-b6a25axeja
-
MD5
919e62a30b23609426f1ba469bb8c709
-
SHA1
e1621f797f0c9be22a83ba30dcda43bd57963922
-
SHA256
4e0fc15a0517d679c24f6ab482f1654f29bb736bb028c8c119358d3dfa64a414
-
SHA512
2b79655a1603c32c041d9e73c64a27d0ffa3d5cd8ce47905177b11c211a45a88e67a1bc7fcf6c5087b2dd7da19b9140364728c7826eb9fbc77d7994904b9bb5c
-
SSDEEP
96:gAL55oeloiAQ26t3OgVjEROkZx0xFImhcVUXs2kfo8Q8Ri:bdoRxUfr38Y
Static task
static1
Behavioral task
behavioral1
Sample
rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmd
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
Bundle$$
iwarsut775laudrye2.duckdns.org:57484
iwarsut775laudrye2.duckdns.org:57483
iwarsut775laudrye3.duckdns.org:57484
hjnourt38haoust1.duckdns.org:57484
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
sfvnspt.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
shietgtst-RX5FWO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmd
-
Size
6KB
-
MD5
f7ba2a252aad41953101bc4032d650ee
-
SHA1
9647596c54892c99981179267b193da9643aa839
-
SHA256
842c000429c7e5787fb9fd0961238758e04b4af6c6b56dc4bb0c4db27af69fce
-
SHA512
1a33c465faa62a5397eab362912967b25604cb8320e2ec5faf44374bc161d054b1e0e217100fbdea331b9114e4221e689531b46fd7b435020a7af43d28a98682
-
SSDEEP
192:VQW8A6936logZZQlXtVaEGmpQnYHZYya0wb7:6E6pGZ59mOnYfaXb7
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-